Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3. Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the same company. They want to secure all the


image

3. Alice and Bob are employees residing in two dispersed branches, D1 and D2, of the same company. They want to secure all the communications between them as follows: they want to ensure the authenticity of their IP packets when those packets are routed in the company intranet (i.e., Alice can verify a packet is indeed from Bob, and vice versa); they want to ensure confidentiality of their IP packet data (including IP source addresses) when those packets are routed in the external network between D1 and D2. For example, the communications are transferred via nodes: D1 ---N1---N2---3--- N4---D2. When N2 receives the packet from N1, it doesn't know the packet is from D1. Design a security solution for the above scenario within the format of an IP packet when it is delivered at different sections of the network and highlight the differences compared to normal solution without the above protections. The solution should be composed of (1) how to generate an IP packet and (2) what to do after receiving an IP packet. For simplicity, we assume that A and B are using unique and public IP addresses and they have a shared secret key before the communication. (4 marks) 0 4 8 16 31 bit Version IHL TOS Total length Identification Flags Frgment offset TTL Protocol Header checksum Source address Destination address Options Data 20 bytes 0-40 bytes Up to 65536 bytes

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Computer Network questions

Question

25.0 m C B A 52.0 m 65.0 m

Answered: 1 week ago

Question

List some application-layer protocols mentioned in this chapter

Answered: 1 week ago