1. Describe how the keys are managed (shared) in: a. Public key cryptography b. Secret (private key cryptography) 2. You are given the hash function, h(k)= k mod m. Describe in detail, a. How and why a collision may occur