1-list a few application of stream cipher and blockcipher?
2-what is the difference between weak and strongcollision resistance?
3- What is the role of compression function in hashfunction?
4- what is the major issue in end to end keydistribution ? how does the key hierarchy concept address thatissue?
5- explain why man-in-middle attack are ineffective onthe secret key distribution protocol discussed in figure below?
6- Discuss the potential security issue that arise dueto public key directory based system?
7-List four
OR
OR