Question: Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and
Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and R2. As part of a reply attack, Trudy sends a duplicate copy of one of the data-grams sent from R I Lo R2. Will R2 decrypt the duplicate data-gram and forward it into the branch-office network? If not, describe in detail how R2 detects the duplicate data-gram.
Figure 8.28

Headquarters Branch Office Internet 193.68.2.23 200.168.1.100 SA R2 R1 172.16.1/24 172.16.2/24
Step by Step Solution
3.35 Rating (161 Votes )
There are 3 Steps involved in it
If Trudy does not bother to change the seque... View full answer
Get step-by-step solutions from verified subject matter experts
