AnalysisDiagram6. Apply the MAC on the cryptographic checksum method to authenticate build confidentialityof the message where the authentication is tied to messageM=8376, K1=4892, K2=53624071(Nov/Dec 2009)7. What are the properties a hash function must satisfy? (Nov/Dec 2009)Explanation6.Explain MD5 message digest algorithm, with its logic and compression function.(Nov/Dec 2009)AlgorithmExplanationDiagram7.Explain the secure hash algorithm. (April/May 2010)AlgorithmExplanationDiagram8.Describe the steps in MD5 algorithm. (April/May 2010)AlgorithmExplanationDiagram11. Explain the Diffie–Hellman key exchange using an example. (April/May 2010)AlgorithmIllustrationDiagram12. .Explain Elliptic Curve Architecture.•Architecture•Algebraic description•Geometric description13. How does SHA-1 logic produce message digest? (May/June 2009)14.What is message authentication ?Explain. (May/June 2009)15. Write and explain the Digital Signature Algorithm.·Signature = (r,s)·Verify v = r’Download Useful Materials from Rejinpaul.com