Question descriptionSubject-Network Securityplease do good online research and use the attached PPT belowVery very very very important please make it very effectively and NO PLAGIARISM ,5 APA FORMAT REFERENCESplease answer each and every question in detail and please no plagiarism at allList three approaches to message authenticationWhat is a message authentication code?Briefly describe the three schemes illustrated in figure3.2What properties must a hash function have to be useful for message authentication?In the context of a hash function, what is a compression function?What are the principal ingredients of a public-key cryptosystem?List and briefly define three uses of a public-key cryptosystem?What is the difference between a private key and a secret key?What is a digital signature?Note- for question the diagram is attached belowPlease make it very very effectively and no plagiarism very strictly all in APA format onlyPlease answer each and every question in detailExample- Question1answer 1Question2answer 2Paper must in this format