Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into

Question:

Consider the example in Figure 8.28. Suppose Trudy is a woman-in-the middle. Who can insert data-grams into the stream of data-gram going from Rl and R2. As part of a reply attack, Trudy sends a duplicate copy of one of the data-grams sent from R I Lo R2. Will R2 decrypt the duplicate data-gram and forward it into the branch-office network? If not, describe in detail how R2 detects the duplicate data-gram.


Figure 8.28

Headquarters Branch Office Internet 193.68.2.23 200.168.1.100 SA R2 R1 172.16.1/24 172.16.2/24

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question
Question Posted: