Compute the hash - part of the packet, Computer Networking

Assignment Help:

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop is on VPN Site 1 while Bob's is on VPN site 2. Assume the IP address of Alice's desktop is 130.2.3.244; the IP address of Bob's desktop is 166.100.66.2. In addition, because neither Alice nor Bob trusts all employees in their companies, they would use the Transparent Mode of ESP.

1336_Compute the hash - part of the packet.png

When Alice sends message "Stock X price $29" to Bob, the message sender program running on Alice's desktop needs to firstly compose the packet before it is encrypted. This cleartext packet will be the exact same packet in your answer for Question 3.1. Next, the sender packet will use ESP to encrypt the packet. After this packet is encrypted, what does the packet look like? Please draw the whole packet and mark the fields that are encrypted.

Next, Alice's message sender program will apply the AH protocol so that all IP spoofing attacks and message replacement attacks can be defeated. To compute the hash, which part of the packet resulted from Question 4.1 will be used as the input?

After the hash is computed by Alice's message sender program, the hash will be included in which part of the packet sent out from Alice's desktop?

After a while, the packet will arrive at the VPN router on site 2. Will the VPN router decrypt the packet? Why?

After a while, the packet will arrive at Bob's desktop. Is it possible for Bob to decrypt the packet and get the message before the AH header is verified? Why?

After the packet arrives at Bob's desktop, please give a step-by-step answer on how the AH header is verified by the receiver program running on Bob's desktop.

During the whole process from (4.1) to (4.6), where is the IKE protocol used?


Related Discussions:- Compute the hash - part of the packet

Satellite radio channels - computer network, Satellite Radio Channels ...

Satellite Radio Channels A communication  satellite links two or more  earth  microwave transmitter receiver, know  as ground  stations. The satellite receives transmission on

Connection oriented transport tcp - transport layer, Connection Oriented Tr...

Connection Oriented Transport TCP In addition  to providing  reliable communication transmission control protocols  effects errors  control flow  control  and resequencing of

Dns records and messages - application layer, DNS Records  and Messages ...

DNS Records  and Messages Two types  of records  are used DNS. The  question records  are used in the question  section of the query and response  messages. The resource  reco

Data mining, The following DNA sequences are extracted from promoter region...

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

Calculate the voltage on the capacitor, Quetion: A 22 nF capacitor is i...

Quetion: A 22 nF capacitor is initially charged to 10V. It is then discharged by connecting a 100kW resistor across it. Approximately how long does it take for the voltage on t

Discuss user datagram protocol, Problem 1 Bring out the differences bet...

Problem 1 Bring out the differences between POP and IMAP4 Problem 2 Discuss User Datagram protocol Problem 3 Explain the various steps in TCP congestion control

In formation sharing at regular intervals, In formation  sharing at  regu...

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

What are the key benefits of layered network, What are the key benefits of ...

What are the key benefits of layered network? Main advantages of layered network are given below: a) Complex systems can be split into understandable subsystems. b) Any f

What is a tp monitor, What is a TP Monitor? There is no commonly accept...

What is a TP Monitor? There is no commonly accepted explanation for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Layer of security, Other than performance  issues, there could be security ...

Other than performance  issues, there could be security reasons for using something like xinetd.  Make simple design in which a new version of xinetd gives a layer of security.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd