Unformatted text preview: case? C. In what way does a cryptographic hash, e.g., MD5, provide better message integrity check than an Internet checksum? D. Consider a variation of the MAC algorithm (Figure 8.9 in text) where the sender sends (m, H(m)+s), where H(m) + s is the concatenation of H(m) and s. Is this variation flawed? Why or why not? Problem 2 (Mobile IP): Consider the diagram on slide 6-51, and suppose now that the correspondent (shown as being stationary in its home network in slide 6-51) and the mobile host shown in Figure 6-51 are both mobile. Draw the corresponding diagram for this case, showing the steps taken when the correspondent sends a datagram to the remote host and the remote host replies back to the correspondent. Problem 3 (Wireless): Problem P8 from Chapter 6. Problem 4 (Security): Problem P10 from Chapter 8. Problem 5 (Security): Problem 24 from Chapter 8....
View Full Document
- Fall '09
- Cryptography, Public-key cryptography, Pretty Good Privacy, Cryptographic hash function, Symmetric-key algorithm, GNU Privacy Guard