1. Adversary Model

Five adversary models from week to powerful are:

In a network, Alice would like to send some encrypted messages to Bob.