How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack. The effectiveness of DES as an encryption algorithm. Identify its strengths and weaknesses. Finally, explain why the implementation of DES should be limited to the transmission of short messages.