Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle attacks?
(1)Authentication
(2)Authorization
(3)Confusion
(4)Encryption