Compute the hash - part of the packet, Computer Networking

Assignment Help:

In this question, we study Nested ESP in AH, that is, we combine ESP with AH. Let's look at the site-to-site VPN scenario shown again in Figure 1. Let's assume that Alice's desktop is on VPN Site 1 while Bob's is on VPN site 2. Assume the IP address of Alice's desktop is 130.2.3.244; the IP address of Bob's desktop is 166.100.66.2. In addition, because neither Alice nor Bob trusts all employees in their companies, they would use the Transparent Mode of ESP.

1336_Compute the hash - part of the packet.png

When Alice sends message "Stock X price $29" to Bob, the message sender program running on Alice's desktop needs to firstly compose the packet before it is encrypted. This cleartext packet will be the exact same packet in your answer for Question 3.1. Next, the sender packet will use ESP to encrypt the packet. After this packet is encrypted, what does the packet look like? Please draw the whole packet and mark the fields that are encrypted.

Next, Alice's message sender program will apply the AH protocol so that all IP spoofing attacks and message replacement attacks can be defeated. To compute the hash, which part of the packet resulted from Question 4.1 will be used as the input?

After the hash is computed by Alice's message sender program, the hash will be included in which part of the packet sent out from Alice's desktop?

After a while, the packet will arrive at the VPN router on site 2. Will the VPN router decrypt the packet? Why?

After a while, the packet will arrive at Bob's desktop. Is it possible for Bob to decrypt the packet and get the message before the AH header is verified? Why?

After the packet arrives at Bob's desktop, please give a step-by-step answer on how the AH header is verified by the receiver program running on Bob's desktop.

During the whole process from (4.1) to (4.6), where is the IKE protocol used?


Related Discussions:- Compute the hash - part of the packet

Calculate the efficiency of stop and wait arq, (i)  Suppose that frames are...

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in

Receive window - transport layer, Receive Window This  field  defin...

Receive Window This  field  defines the size  of the  window in bytes  that the  other party  must  maintain. Note  that the  length  of this  field 16 bits  which  means

Work-sharing constructs in openmp, Work-Sharing Constructs A work-shari...

Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons

Ip message finally reassemble, Concept of how does the IP message finally r...

Concept of how does the IP message finally reassemble?

Security impact of not having a public key infrastructure, (a) You are pro...

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

The concept of universal service, The major problems with multiple networks...

The major problems with multiple networks are as given: A computer attached to a given server can only interact with other computers attached to the similar network.

Describe the method of one way redistribution and mutual, Define  the conce...

Define  the concept of one way redistribution and mutual

Combine subtitution and transposition, how to own cipher to encrypt and dec...

how to own cipher to encrypt and decrypt message by combine both substitution ans transposition algorithm using c program

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd