Do the following review questions: 3.1 List three approaches to message authentication. 3.2 What is a message authentication code? 3.4 What properties must a hash function have to be useful for message authentication? 3.5 In the context of a hash function, what is a...