I need the solutions for the 2 problems of this uploaded file. like;
For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why.
Services:
C Confidentiality,
AS Authentication of the Sender,
AR Authentication of the Receiver,
NS Non-repudiation of the Sender, and
NR Non-repudiation of the Receiver.
The file uploaded has the whole 2 problem Questions
