Explain how an integrity check value used

Assignment Help Computer Networking
Reference no: EM131307621

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors.

(b) When using an ICV, explain why

(i) a message might be transmitted correctly but the receiver believes the message contains an error (a false negative).

(ii) a message might be transmitted incorrectly but the receiver believes the message is correct (a false positive).

(c) Briefly explain why an ICV cannot be used to detect modifications.

2. Consider the following two algorithms A and B for computing an ICV: Step A1) Split the data into 7-bit chunks
Step A2) For each chunk add an 8th bit, choosing the value of the bit to be the same as the 1st bit

Using algorithm A, the 21-bit message 0001110 1010011 1110110, for example, would be transmitted as: 00011100 10100111 11101101

Step B1) Split the data into 7-bit chunks

Step B2) For each chunk add an 8th bit, choosing the value of the bit so that each 8-bit chunk contains an even number of bits with the value 1 (and hence an even number of bits with the value 0)

Using algorithm B, the 21-bit message 0001110 1010011 1110110 would be transmitted as 00011101 10100110 11101101.
For each algorithm A and B explain:

(a) How the receiver checks whether the message has been transmitted without error.

(b) Under what circumstances a false negative occurs.

(c) Under what circumstances a false positive occurs. [2] Hence:

(d) Carefully explain which algorithm you think is better for computing ICVs.
[Bonus question: Identify a simple mechanism for reducing the number of false positives produced by algorithm B.]

3. Consider the following protocols, Probe and Copy: Probe 1. Send "Hello" message

Probe 2. Recipient returns a string of 512 random bits to the sender

Copy 1. Send message

Copy 2. Recipient returns a copy of the message to the sender

Assuming machines A and B are each running implementations of the Probe and Copy pro- tocols, explain:

(a) How an attacker M can use Probe to cause A to send a message to B.

(b) How M can establish an endless loop of messages between A and B.

(c) Whether the attacker needs to be on-path to execute these attacks?

Reference no: EM131307621

Questions Cloud

How history might provide an alternative explanation : Briefly describe how history might provide an alternative explanation for the reduction in anxiety.- Briefly describe how instrumentation might provide an alternative explanation for the reduction in anxiety.
Determine the plaintext m from a given ciphertext : Show that it is not necessary to factor n in order to determine the plaintext m from a given ciphertext c, the public key e, and the modulus n.
Discuss about evaluation of thematic development : DIscuss about EVALUATION OF THEMATIC DEVELOPMENT.This geographic advance of the church is not Luke's only indication of his structure for the book.Acts divides neatly into 2 parts, focusing in the first12 chapters upon Peter's witness of the resurr..
Do you think criteria should be broadened to incorporate : When evaluating the effectiveness and suitability of leadership/managerial training, do you think criteria should be broadened to incorporate societal costs/impacts that run beyond the focus of individual 'profit maximization'?
Explain how an integrity check value used : Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted without error
Create journal entries for the given transactions : Create journal entries for the following transactions. Draw up a T-accounts for each account affected by transactions. Calculate ending balances for all T-accounts
Explain the actions used in an experiment to avoid : Define or describe the third-variable problem and the directionality problem. Explain the actions used in an experiment to avoid these two problems.
An example of the experimental research strategy : Finally, Dr. Jones compared the activity level for the high-sugar group with the activity level for the low-sugar group. Explain why Dr. Jones' study is not an example of the experimental research strategy.
Why should salts be chosen at random : Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Tcpipproblem 1bullexplain what is the biggest problem in

tcpipproblem 1.bullexplain what is the biggest problem in routing security and you may not all agree on which problem

  Find features and capacities for web server computer

Find out the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will require for her site.

  What is the difference between capturing traffic for

answer the following questions in a two to three page word document using good apa formatting.1 four capabilities are

  Determine a physical layout of the computers on floor plan

Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above)

  How the letter a is transmitted in an light and radio wave

Create a detailed diagram or set of diagrams to show how the letter A is transmitted in an electrical, light, and radio wave. Show the similarities and differences between how data is transmitted in these three processes.

  Which physical topology type connects all end nodes to a

a avoids the potential inefficiencies of csmacd because no transmission capacity if wasted on collisions and

  Explain system gives protection using bell-lapadula policy

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if: The virus were placed on the system at system low (the compartment that all other compartments dominate)?

  Evolution of the telecommunications industry

The World Wide Web the best know example of a WAN that's why once a WAN is in place, WAN security must be implemented. Some methods for securing WANs include firewalls, routers with access control lists, and intrusion detection systems

  Determine maximum number of ip addresses assigned

Determine the smallest size subnet which can be utilized to fulfil this requirement? _______. Determine the maximum number of IP addresses which can be assigned in this size subnet?

  What alternatives telephone company use to increase capacity

This fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

  Conduct a survey on a topic relevant to telecommunications

Conduct a survey on a topic relevant to telecommunications and computer networking - What are the current issues the industry is addressing and proposed solutions.

  What are the most common security threats

What are some of the criteria that can be used to rank security risks?  - What are the most common security threats?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd