Questions-1 Provide short answers (i.e., no more than five lines on average 1. Discuss the applications of the DES, RC4, AES, and RSA Algorithms. 2. Using a figure, state the operations and the usages of the SSH Protocol. 3. Specify the computations of the IPSEC Protocol, its status in the Network Stack, and possible interactions with its router. 4. Explain and show (in a figure) the operations of the HTTP Authentication and the HTTPS Protocol (HTTP over SSL). 5. Mention the usages, advantages, and disadvantages of Secure FTP and PGP. .