1. What requirements must a public-key cryptosystems fulfill to be a secure algorithm? 2. In the SHA-512 hash function, a) What is value of the

b) What is the value of the length field if the length of the message is 1921 bits?