This preview shows page 1. Sign up to view the full content.
Unformatted text preview: case? C. In what way does a cryptographic hash, e.g., MD5, provide better message integrity check than an Internet checksum? D. Consider a variation of the MAC algorithm (Figure 8.9 in text) where the sender sends (m, H(m)+s), where H(m) + s is the concatenation of H(m) and s. Is this variation flawed? Why or why not? Problem 2 (Mobile IP): Consider the diagram on slide 6-51, and suppose now that the correspondent (shown as being stationary in its home network in slide 6-51) and the mobile host shown in Figure 6-51 are both mobile. Draw the corresponding diagram for this case, showing the steps taken when the correspondent sends a datagram to the remote host and the remote host replies back to the correspondent. Problem 3 (Wireless): Problem P8 from Chapter 6. Problem 4 (Security): Problem P10 from Chapter 8. Problem 5 (Security): Problem 24 from Chapter 8....
View Full Document
This document was uploaded on 02/06/2011.
- Fall '09