<p>1.Assume Alice and Bob share a secret, and they both know how togenerate a hash for a message. Design a protocol to protect theintegrity of messages transmitted over insecure media
<br/><img src="https://media.cheggcdn.com/media%2F9b6%2F9b6ed107-413e-46ad-aa48-675ecc616916%2Fimage.png" alt="*10-24. Determine the moments acting at the supports and D of the battered-column frame. Take 0 1 600 in4. 4 k/ft 6 k :81 20 ft 15 ft