cryptography and Network Security

I need the solutions for the 2 problems of this uploaded file. like;

 For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why. 


 C – Confidentiality, 

 AS – Authentication of the Sender, 

 AR – Authentication of the Receiver, 

 NS – Non-repudiation of the Sender, and 

 NR – Non-repudiation of the Receiver. 

The file uploaded has the whole 2 problem Questions

Tags: No tags