... (B, rA) (where B repre-sents Bob’s identity), s1:= SignsA(t1) and sends (t1, s1) to Bob.2. Bob verifies Alice’s signature, checks that he is the intendedrecipient, chooses r B and ... are used instead of encrypt anddecrypt.2Each plaintext character is replaced by the character 3 to the right modulo 26,i.e., a is replaced by d, b by e,. . ., x by a, y by b and z by c.2 ... in-formation about the plaintext from the ciphertext, with some non-negligibleprobability. Probabilistic algorithms can toss coins, and their control flowmay be at least partially directed by...