what are 2 requirements for symetric encryption

what do cryptanalytic attacks rely on

what is the most widly used encyption scheme
DES
what is the difference between DES and triple DES
3DS just repeats the DES algorithim with 2 or 3 unique keys
what is this

block ciypher
what is this

stream cipher
what are the 3 benefitis of message authentication

what are these the requirements for

hash function
how is a digital signature made
created by encypteing hash code with private key
what is a digital signature used for
authenticating both source and data integrity
what does a digitial envelope do
protects a message without needeing to first arrange for sender and reciever to have the same secret key