Bob has a public RSA key (n = 77, e = 13). He sends Alice a message m and the digital signature s of the message. The message and signature that Alice receives is (m = 3, s = 5). Should Alice accept the message as genuine or not? You must give justification for your answer. Solution she can accept the message as genuine but only after she decrypt the message. If Alice and Bob wish to communicate, Alice sends Bob her public key and Bob gives his public key to Alice. Alice then encrypts her message to Bob with Bob’s public key, knowing that only Bob, the possessor of Bob’s private key, can decrypt the message. Likewise, Bob encrypts his messages to Alice with Alice’s public key. Public keys may be stored in a database or some well- known repository so that the keys do not have to be transmitted. Not only does public key cryptography solve key distribution, it also solves the problem of having [n(n-1)]/2 keys for n users. Now we only need 2n keys (n public and n private)..