1) Trust establishment is often the most challenging part of designing
a security protocol: making sure you are talking to the correct
person. Give two examples of different approaches in the literature for establishing
trust and explain their caveats.