Alice intends to send a secure message to Bob. (1) What are the threats that Alice should be concerned about in sending messages to Bob? (2) What information does Alice need if symmetric key encryption is used? (3) What is needed if asymmetric key encryption is used? (4) Is encryption alone sufficient to defend against these threats? Solution Alice intends to send a secure message to Bob. (1). The threats that Alice should be concerned about in sending messages to Bob are,,, a.Eavesdropping b.Traffic analysis c.cryptanalysis (2).  Alice needs the information if symmetric key encryption used is... * Symmetric-key cryptography is a mechanism by which the same key is used for both encrypting and decrypting. (3). if asymmetric key encryption is used the needed thing is... * asymmetric key encryption is used Two keys are a public and a private one. The public one is available for everyone, but the private one is known only by the owner. (4). No, Encryption alone is not sufficient to defend against these threats. .