![EBK COMPUTER NETWORKING](https://www.bartleby.com/isbn_cover_images/8220102955479/8220102955479_largeCoverImage.jpg)
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem R11RQ
Program Plan Intro
Hash Function:
Any function that can be used to map data of arbitrary size to data of a fixed size is called a hash function.
Hash functions provide message integrity as it is computationally infeasible to find any two messages with the same hash.
Hashing:
Hashing is a data structure technique that is used to index and retrieve items in a
Given information:
In a Message Authentication Code (MAC), the sender sends
Expert Solution & Answer
![Check Mark](/static/check-mark.png)
Want to see the full answer?
Check out a sample textbook solution![Blurred answer](/static/blurred-answer.jpg)
Students have asked these similar questions
Msg3. B→A : B, N1, Ks, Message2, h(B, N1, Message2)
Whereas:
h(m) represents the digest of the message (m).
{m}{K} represents the encryption of message (m) using the key (K)
PK is public key
N1 is a random number.
1. What are the main problems in Msg3?
Alice and Bob decided to use HMAC to authenticate the communication between them. They already share a key k for
the MAC scheme. To sign a message M (which is always of an even bit length), the sender parses the message as
M=M_L||M_R, i.e. the message is parsed as a left half and a right half (both halves have equal length), then the sender
computes X-M₁MR (where denotes XOR). The sender then sends M and T=HMACK(X) to the other party. Does this
construction provide existential unforgeability?
Yes
No
The function f(R, K) = P(S(E(R XOR K)) of the DES
cryptographic protocol manipulates different sizes of bit-strings. The bit-string sizes of
P-SEK in this order are:
32-48-48-32
32-32-48 48
48-48-32-32
64-32-32 48
64 48 32-64
SAVE
Chapter 8 Solutions
EBK COMPUTER NETWORKING
Ch. 8 - Prob. R1RQCh. 8 - Prob. R2RQCh. 8 - Prob. R3RQCh. 8 - Prob. R4RQCh. 8 - Prob. R5RQCh. 8 - Prob. R6RQCh. 8 - Prob. R7RQCh. 8 - Prob. R8RQCh. 8 - Prob. R9RQCh. 8 - Prob. R10RQ
Ch. 8 - Prob. R11RQCh. 8 - Prob. R12RQCh. 8 - Prob. R13RQCh. 8 - Prob. R14RQCh. 8 - Prob. R15RQCh. 8 - Prob. R16RQCh. 8 - Prob. R17RQCh. 8 - Prob. R18RQCh. 8 - Prob. R19RQCh. 8 - Prob. R20RQCh. 8 - Prob. R21RQCh. 8 - Prob. R22RQCh. 8 - Prob. R23RQCh. 8 - Prob. R24RQCh. 8 - Prob. R25RQCh. 8 - Prob. R26RQCh. 8 - Prob. R27RQCh. 8 - Prob. R28RQCh. 8 - Prob. R29RQCh. 8 - Prob. R30RQCh. 8 - Prob. R31RQCh. 8 - Prob. R32RQCh. 8 - Prob. R33RQCh. 8 - Prob. P1PCh. 8 - Prob. P2PCh. 8 - Prob. P3PCh. 8 - Prob. P4PCh. 8 - Prob. P5PCh. 8 - Prob. P6PCh. 8 - Prob. P8PCh. 8 - Prob. P12PCh. 8 - Prob. P13PCh. 8 - Prob. P14PCh. 8 - Prob. P18PCh. 8 - Prob. P20PCh. 8 - Prob. P21PCh. 8 - Prob. P22PCh. 8 - Prob. P23P
Knowledge Booster
Similar questions
- Design a cryptographic solution for implementing the dinning cryptographers protocol. You should consider the following: The secret messages shared between any two agents in the protocol are communicated over public channels only. The announcements made by each agent must be traceable in a trustworthy way to that agent. Your solution should be a new protocol that addresses the above two requirements.arrow_forwardThe following is the Diffie-Hellman protocol, Alice Bob a" (mod p) y a' (mod p) K=a" (mod p) K= 0" (mod p) Alice and Bob decide to make a small change to the protocol: instead of sending a (mod p) and a' (mod p), they send each other xa (mod p) and ya (mod p). Alice Bob x"(mod p) y (mod p) K= (xy)" (mod p) K= (y) (mod p) Then Alice and Bob use K = (xy)" (mod p) as the shared common key. (a)Can Eve break the system without finding the secret numbers x or y? (b)Can Eve find the secret numbers x and y?arrow_forwardAn input string S of length N is transferred through the network using a special protocol. The protocol can send the string through a series of operations. In one operation, we can choose a lowercase english alphabet and do one of the following: Transfer 1 copy of C through the network. Transfer 2 copies of C through the network. Each of the above transfers take 1 unit of time. Find the minimum time in which we can transfer the entire string S through the network. Note: Please Answer Python only Input 1 5 cbcdc Output 5arrow_forward
- A messaging system reads message as 4-digit positive integer d1d2d3d4 and stores encoding of the message e1e2e3e4 for security reason. The encoding process is as follows: ei = (di+i) mod 3 For example, if message is 4590, the encoded message is 2101. Read any arbitrary message and display the encoded message in the following format: Original message = Encoded message = language : Carrow_forwardConsider the following Encrypted Key Exchange (EKE) protocol where A and B share a common password P, Ep denotes a symmetric key encryption algorithm using P as the encryption key, and Encpk denotes a public key encryption algorithm using PK as the encryption key. Note that PK is randomly generated by A in each session. В: Ep (РК) Ep(Епсрк (К)) 1. A 2. В » A: Output : K (Session key). (1) Is this protocol secure if we replace the ephemeral PK in step 1 by a digital certificate (i.e., a PK certified by a trusted CA)? Justify your answer. (2) Does this protocol provide forward secrecy? Justify your answer.arrow_forwardPlease solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (a) What will be the sequence number of the third TCP handshake signal send from PC to webserver?…arrow_forward
- Please solve it correctly and please provide explanation of your answers. A PC and a Web Server are communicating over a TCP connection. The PC had started the three way handshake with the initial sequence number of 3069 . The Web Server's initial sequence number is 4830 . The window size of the PC is 815 bytes and the window size of the Web Server is 463 bytes. Using the third TCP handshake ack segment the PC sends the http request of the size 396 bytes to the Web Server. Then the Web Server answers with 3 segments containing the requested data. The first segment size is 42 bytes and the second segment size is 276 bytes and the third segment size is 146 bytes respectively. The PC receives all three segments within the timer. But unfortunately the second segment was corrupted. So the PC immediately sends an acknowledgement segment. Assume that the PC uses Selective Repeat/Reject ARQ. (d) What will be the window size of PC A after receiving only the first segment from webserver? (e)…arrow_forward9. Given h = Sha256(K || M), where K is a secret and "||" means concatenation (no padding is involved in calculating h). Please describe how one can calculate Sha256(K || X) for a different message X without knowing K.arrow_forwardIn an RPC-like protocol, where numerous requests can be active at the same time and responses can be given in any sequence, the following is possible: Pretend requests are sequentially numbered, and that ACK[N] confirms the receipt of reply[N]. Should the number of ACKs be cumulative? If not, what should happen in the event that an ACK is not received?arrow_forward
- Two neighboring nodes ( A and B ) use a sliding - window protocol with a 3 - bit sequence number . A go - back - N is used with a window size of 5 . Assuming A is transmitting and B is receiving , show the window positions for the following succession of events : a . ) Before A sends any frames b . ) After A sends frames 0 , 1 , 2 , 3 , 4 and B acknowledges them . c . ) After A sends frames 5 , 6 , and 7 and B acknowledges them and the ACK is received by A.arrow_forwardThe token bucket algorithm is a popular method for traffic shaping (recapthe algorithm in textbook Ch. 5.3.2). A computer uses a token bucket with a capacity of 400megabytes (MB), and a rate of 10 MB per second. The machine starts generating 20 MB persecond continuously when the bucket contains 200 MB. How long will it take to send 1000 MB?arrow_forwardA summary of RSA algorithm is described on W10 Notes. Assume that the algorithm is used with p= 11,q=3 and e = 3. 1. Compute n, d, and the decryption key, d 2. Suppose that we wanted to use this system to send a message secretly by letting A = 2, B3,C4,...,Z 27, a - 28, b= 29,... and interleave/scramble the words in the message for extra added security purposes. Compute the plaintext message if the received ciphertext is BQRRCDIHICHMarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780078022159/9780078022159_smallCoverImage.jpg)
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
![Text book image](https://www.bartleby.com/isbn_cover_images/9780134444321/9780134444321_smallCoverImage.gif)
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780132737968/9780132737968_smallCoverImage.gif)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9780133976892/9780133976892_smallCoverImage.gif)
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
![Text book image](https://www.bartleby.com/isbn_cover_images/9781337627900/9781337627900_smallCoverImage.gif)
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
![Text book image](https://www.bartleby.com/isbn_cover_images/9780073373843/9780073373843_smallCoverImage.gif)
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education