3. Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
3. Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the same company. They want to secure all the communications between them as follows: they want to ensure the authenticity of their IP packets when those packets are routed in the company intranet (i.e., Alice can verify a packet is indeed from Bob, and vice versa); they want to ensure confidentiality of their IP packet data (including IP source addresses) when those packets are routed in the external network between D1 and D2. For example, the communications are transferred via nodes: D1 ---N1---N2---3--- N4---D2. When N2 receives the packet from N1, it doesn't know the packet is from D1. Design a security solution for the above scenario within the format of an IP packet when it is delivered at different sections of the network and highlight the differences compared to normal solution without the above protections. The solution should be composed of (1) how to generate an IP packet and (2) what to do after receiving an IP packet. For simplicity, we assume that A and B are using unique and public IP addresses and they have a shared secret key before the communication. (4 marks) 0 4 8 16 31 bit Version IHL TOS Total length Identification Flags Frgment offset TTL Protocol Header checksum Source address Destination address Options Data 20 bytes 0-40 bytes Up to 65536 bytes 3. Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the same company. They want to secure all the communications between them as follows: they want to ensure the authenticity of their IP packets when those packets are routed in the company intranet (i.e., Alice can verify a packet is indeed from Bob, and vice versa); they want to ensure confidentiality of their IP packet data (including IP source addresses) when those packets are routed in the external network between D1 and D2. For example, the communications are transferred via nodes: D1 ---N1---N2---3--- N4---D2. When N2 receives the packet from N1, it doesn't know the packet is from D1. Design a security solution for the above scenario within the format of an IP packet when it is delivered at different sections of the network and highlight the differences compared to normal solution without the above protections. The solution should be composed of (1) how to generate an IP packet and (2) what to do after receiving an IP packet. For simplicity, we assume that A and B are using unique and public IP addresses and they have a shared secret key before the communication. (4 marks) 0 4 8 16 31 bit Version IHL TOS Total length Identification Flags Frgment offset TTL Protocol Header checksum Source address Destination address Options Data 20 bytes 0-40 bytes Up to 65536 bytes
Expert Answer:
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Guidelines: Test answers need to be computer type-written and uploaded on Moodle as Word/Pdf file. Each Test sections need to be addressed separately. Student need to specifically mentioned their...
-
Developments in Technology Light is incident from air on the end face of a multimode optical fibre at angle of incidence as shown below. n n 1 2 The refractive indices of the core and cladding are...
-
1456HHSC attend all (a) In the quantum teleportation protocol, Alice and Bob are every in possession of one qubit of a couple in the joint country00i + statei. Explain how the protocol works. In...
-
One way to delete nodes from a known position in a leftist heap is to use a lazy strategy. To delete a node, merely mark it deleted. When a findMin or deleteMin is performed, there is a potential...
-
Consider subsonic Rayleigh flow that is accelerated to sonic velocity (Ma = 1) at the duct exit by heating. If the fluid continues to be heated, will the flow at duct exit be supersonic, subsonic, or...
-
Two (and only two) full spectral orders can be seen on either side of the central maximum when white light is sent through a diffraction grating. What is the maximum number of lines per cm for the...
-
Computer Audit Topics. It is important that companies have internal audit departments with separate computer audit functions. Indeed, the computer audit profession has emerged in the past decade with...
-
Inventoriable Costs You is asked to travel to Milwaukee to observe and verify the inventory of the Milwaukee branch of one of your clients. You arrive on Thursday, December 30, and find that the...
-
Current Attempt in Progress In applying the high - low method to the following data set, what is the unit variable cost? \ table [ [ Month , Miles, \ table [ [ Total ] , [ Cost ] ] ] , [ January , 7...
-
Wiset Company completes these transactions during April of the current year (the terms of all its credit sales are 2/10, n/30). Apr. 2 Purchased $14,300 of merchandise on credit from Noth Company,...
-
What are the aims of an organization that are expressed in highly abstract and general terms, generally employed for the organization's external constituents? General goals Stakeholder goals Stated...
-
Messenger RNA (mRNA) vaccines have shown great promise in recent years, but some people are concerned about their long-term effects on the immune system. How might studying the way mRNA vaccines...
-
Many single-celled eukaryotes, like yeast, can reproduce asexually through mitosis. However, some eukaryotes, like certain ciliates, undergo a complex form of sexual reproduction called conjugation,...
-
With the rise of containerization technologies like Docker and Kubernetes, how will traditional operating system design principles like process isolation and memory management need to adapt to...
-
Imagine a world where every sound a person utters creates a visible brushstroke in the air, painting a real-time portrait of their emotions. What kind of art movements or social dynamics would emerge...
-
To what extent does the structure of a language, specifically its grammar and vocabulary, influence the way speakers of that language perceive and categorize the world around them, and conversely,...
-
Time to repay installment loan?? Personal Finance Problem???Mia Salto wishes to determine how long it will take to repay a ?$19 comma 000 19,000 loan given that the lender requires her to ...
-
Marc Company assembles products from a group of interconnecting parts. The company produces some of the parts and buys some from outside vendors. The vendor for Part X has just increased its price by...
-
NOPAT is the amount of net income a company would generate if it had no debt and held no financial assets. NOPAT is a better measure of the performance of a company's operations because debt lowers...
-
Free cash flow is the cash flow actually available for distribution to investors after the company has made all the investments in fixed assets and working capital necessary to sustain ongoing...
-
If the business were organized as a partnership or a proprietorship, its income could be taken out by the owners without being subject to double taxation. Also, if you expected to have losses for a...
Study smarter with the SolutionInn App