(a) explain the right order between compression and encryption processing in a secure email application and provide reason(s) to support your claim. (b) explain the right order between compression and digital signature in a secure email application and provide reason(s) to support your claim. (c) what is the overall data compression in the secure email application when both compression and radix 64 algorithms are invoked?