Explain how an integrity check value used

Assignment Help Computer Networking
Reference no: EM131307621

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors.

(b) When using an ICV, explain why

(i) a message might be transmitted correctly but the receiver believes the message contains an error (a false negative).

(ii) a message might be transmitted incorrectly but the receiver believes the message is correct (a false positive).

(c) Briefly explain why an ICV cannot be used to detect modifications.

2. Consider the following two algorithms A and B for computing an ICV: Step A1) Split the data into 7-bit chunks
Step A2) For each chunk add an 8th bit, choosing the value of the bit to be the same as the 1st bit

Using algorithm A, the 21-bit message 0001110 1010011 1110110, for example, would be transmitted as: 00011100 10100111 11101101

Step B1) Split the data into 7-bit chunks

Step B2) For each chunk add an 8th bit, choosing the value of the bit so that each 8-bit chunk contains an even number of bits with the value 1 (and hence an even number of bits with the value 0)

Using algorithm B, the 21-bit message 0001110 1010011 1110110 would be transmitted as 00011101 10100110 11101101.
For each algorithm A and B explain:

(a) How the receiver checks whether the message has been transmitted without error.

(b) Under what circumstances a false negative occurs.

(c) Under what circumstances a false positive occurs. [2] Hence:

(d) Carefully explain which algorithm you think is better for computing ICVs.
[Bonus question: Identify a simple mechanism for reducing the number of false positives produced by algorithm B.]

3. Consider the following protocols, Probe and Copy: Probe 1. Send "Hello" message

Probe 2. Recipient returns a string of 512 random bits to the sender

Copy 1. Send message

Copy 2. Recipient returns a copy of the message to the sender

Assuming machines A and B are each running implementations of the Probe and Copy pro- tocols, explain:

(a) How an attacker M can use Probe to cause A to send a message to B.

(b) How M can establish an endless loop of messages between A and B.

(c) Whether the attacker needs to be on-path to execute these attacks?

Reference no: EM131307621

Questions Cloud

How history might provide an alternative explanation : Briefly describe how history might provide an alternative explanation for the reduction in anxiety.- Briefly describe how instrumentation might provide an alternative explanation for the reduction in anxiety.
Determine the plaintext m from a given ciphertext : Show that it is not necessary to factor n in order to determine the plaintext m from a given ciphertext c, the public key e, and the modulus n.
Discuss about evaluation of thematic development : DIscuss about EVALUATION OF THEMATIC DEVELOPMENT.This geographic advance of the church is not Luke's only indication of his structure for the book.Acts divides neatly into 2 parts, focusing in the first12 chapters upon Peter's witness of the resurr..
Do you think criteria should be broadened to incorporate : When evaluating the effectiveness and suitability of leadership/managerial training, do you think criteria should be broadened to incorporate societal costs/impacts that run beyond the focus of individual 'profit maximization'?
Explain how an integrity check value used : Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors - How the receiver checks whether the message has been transmitted without error
Create journal entries for the given transactions : Create journal entries for the following transactions. Draw up a T-accounts for each account affected by transactions. Calculate ending balances for all T-accounts
Explain the actions used in an experiment to avoid : Define or describe the third-variable problem and the directionality problem. Explain the actions used in an experiment to avoid these two problems.
An example of the experimental research strategy : Finally, Dr. Jones compared the activity level for the high-sugar group with the activity level for the low-sugar group. Explain why Dr. Jones' study is not an example of the experimental research strategy.
Why should salts be chosen at random : Does using passwords with salts make attacking a specific account more difficult than using passwords without salts? Explain why or why not.

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine minimum needed bandwidth for baseband transmission

Determine the minimum required bandwidth for the baseband transmission of an 8-level PAM pulse sequence having a data rate, Rb, of 9600 bps.

  Write a research paper about social networking and privacy

Write a Research paper about Social Networking and Privacy.

  Compare local area and wide area network technologies

Compare and contrast among local area and wide area network technologies and architectures. Compare and contrast among data communication technologies that include transmission media, data link control protocols, and multiplexing.

  What class is this address

What Class is this address and how would this IP address be expressed using CIDR notation? What portion of this IP address identifies the network?

  Explain briefly how the polling mechanism will work

What do you think is the "traffic demand information" in this research i.e. what metric is used for traffic demand information and explain briefly how the "polling mechanism" will work to distribute the traffic demand information in this research?

  What is wep and describe five major characteristics of wep

What is WEP? Describe the five major characteristics of WEP. What does MIMO do? What are the two main WLAN modes, and how do they differ? What is the SSID?

  Explain in some detail how a router works

Explain in some detail how a router works, and how it affects security. Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols?

  Router traffic classification proof of concept

Router Traffic Classification Proof of Concept, Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab and what you learned by performing it

  Evaluate all aspects of an organisation that uses e-commerce

The purpose of this assignment is to enable students to critically evaluate all aspects of an organisation that uses e-Commerce and e-Business and communicate these key issues through a written report based on the questions for case study released..

  Security primitivesaexplain the different roles between

security primitivesaexplain the different roles between hashing and message authentication codes mac. can a good hash

  External intrusion of the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Data communications and net-centric computing homeworklan

data communications and net-centric computing homeworklan sectionq1. list a below contains the layers of the internet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd