Explain how an integrity check value used

Assignment Help Computer Networking
Reference no: EM131307621

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors.

(b) When using an ICV, explain why

(i) a message might be transmitted correctly but the receiver believes the message contains an error (a false negative).

(ii) a message might be transmitted incorrectly but the receiver believes the message is correct (a false positive).

(c) Briefly explain why an ICV cannot be used to detect modifications.

2. Consider the following two algorithms A and B for computing an ICV: Step A1) Split the data into 7-bit chunks
Step A2) For each chunk add an 8th bit, choosing the value of the bit to be the same as the 1st bit

Using algorithm A, the 21-bit message 0001110 1010011 1110110, for example, would be transmitted as: 00011100 10100111 11101101

Step B1) Split the data into 7-bit chunks

Step B2) For each chunk add an 8th bit, choosing the value of the bit so that each 8-bit chunk contains an even number of bits with the value 1 (and hence an even number of bits with the value 0)

Using algorithm B, the 21-bit message 0001110 1010011 1110110 would be transmitted as 00011101 10100110 11101101.
For each algorithm A and B explain:

(a) How the receiver checks whether the message has been transmitted without error.

(b) Under what circumstances a false negative occurs.

(c) Under what circumstances a false positive occurs. [2] Hence:

(d) Carefully explain which algorithm you think is better for computing ICVs.
[Bonus question: Identify a simple mechanism for reducing the number of false positives produced by algorithm B.]

3. Consider the following protocols, Probe and Copy: Probe 1. Send "Hello" message

Probe 2. Recipient returns a string of 512 random bits to the sender

Copy 1. Send message

Copy 2. Recipient returns a copy of the message to the sender

Assuming machines A and B are each running implementations of the Probe and Copy pro- tocols, explain:

(a) How an attacker M can use Probe to cause A to send a message to B.

(b) How M can establish an endless loop of messages between A and B.

(c) Whether the attacker needs to be on-path to execute these attacks?

Reference no: EM131307621

Questions Cloud

How history might provide an alternative explanation : Briefly describe how history might provide an alternative explanation for the reduction in anxiety.- Briefly describe how instrumentation might provide an alternative explanation for the reduction in anxiety.
Determine the plaintext m from a given ciphertext : Show that it is not necessary to factor n in order to determine the plaintext m from a given ciphertext c, the public key e, and the modulus n.
Discuss about evaluation of thematic development : DIscuss about EVALUATION OF THEMATIC DEVELOPMENT.This geographic advance of the church is not Luke's only indication of his structure for the book.Acts divides neatly into 2 parts, focusing in the first12 chapters upon Peter's witness of the resurr..
Do you think criteria should be broadened to incorporate : When evaluating the effectiveness and suitability of leadership/managerial training, do you think criteria should be broadened to incorporate societal costs/impacts that run beyond the focus of individual 'profit maximization'?
Explain how an integrity check value used : Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted without error
Create journal entries for the given transactions : Create journal entries for the following transactions. Draw up a T-accounts for each account affected by transactions. Calculate ending balances for all T-accounts
Explain the actions used in an experiment to avoid : Define or describe the third-variable problem and the directionality problem. Explain the actions used in an experiment to avoid these two problems.
An example of the experimental research strategy : Finally, Dr. Jones compared the activity level for the high-sugar group with the activity level for the low-sugar group. Explain why Dr. Jones' study is not an example of the experimental research strategy.
Why should salts be chosen at random : Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd