Question: Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and

Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and R2. As part of a reply attack, Trudy sends a duplicate copy of one of the data-grams sent from R I Lo R2. Will R2 decrypt the duplicate data-gram and forward it into the branch-office network? If not, describe in detail how R2 detects the duplicate data-gram.


Figure 8.28

Headquarters Branch Office Internet 193.68.2.23 200.168.1.100 SA R2 R1 172.16.1/24 172.16.2/24

Headquarters Branch Office Internet 193.68.2.23 200.168.1.100 SA R2 R1 172.16.1/24 172.16.2/24

Step by Step Solution

3.35 Rating (161 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

If Trudy does not bother to change the seque... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Networking Questions!