help hash mac
4 Hash MAC (10 pts) m Alice Bob t CRC (m) ‘Y’ or ‘N’ V(m,t) Attacker 1. Describe the security vulnerability of the system provided above. (3 pts) so dnl ro 2. What is the solution for the problem found in Problem 1? (3 pts) 3. One example of the solution that was found in Problem 2 is “Hash Message Authentication Code (MAC).” (i) sender and (ii) receiver. (4 pts) Describe the operation principle of hash MAC at