Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
experiment with a compression utility eg compress gzip or pkzip what compression ratios are you able to achieve see if
consider the following simple udp protocol based loosely on tftp request for comments 1350 for downloading files client
suppose you want your filter-based firewall to block all incoming telnet connections but to allow outbound telnet
figure 811 shows one-way authentication using rsa show how rsa can be used for two-way authenticationfigure
compare a filtering firewall to a proxy firewall in terms of protection against spoofing attacks assume a configuration
suppose filtering routers are arranged as in figure 824 the primary firewall is r1 explain how to configure r1 and r2
using the browser of your choice find out what certification authorities for https your browser is configured by
estimate the probabilities of finding two messages with the same md5 checksum given total numbers of messages of 263
suppose a user employs one-time passwords as above or for that matter reusable passwords but that the password is
one mechanism for resisting replay attacks in password authentication is to use one-time passwords a list of passwords
it is said that ipsec may not work with network address translation nat rfc 1631 however whether ipsec will work with
suppose we have a very short secret s eg a single bit or even a social security number and we wish to send someone else
learn about a key escrow encryption scheme for example clipper what are the pros and cons of key
6suppose a firewall is configured to allow outbound tcp connections but inbound connections only to specified ports the
suppose we wanted to encrypt a telnet session with say des telnet sends lots of 1-byte messages while des encrypts in
suppose two people want to play poker over the network to deal the cards they need a mechanism for fairly choosing a
having the timestamp clock count time in units of one frame time or one voice sample time would be the minimum
propose a mechanism for deciding when to report an rtp packet as lost how does your mechanism compare with the tcp
rfc 1889 specifies that the time interval between receiver rtcp reports include a randomization factor to avoid having
explain the relationship between uniform resource locators urls and uniform resource identifiers uris give an example
how might you encode audio or video data in two packets so that if one packet is lost then the resolution is simply
suppose you are doing rsa encryption with p 101 q 113 and e 3a find the decryption exponent d hint although there
prove that the rsa decryption algorithm recovers the original message that is med equiv m mod pq hint you may assume
in the three-way authentication handshake of figure 89 why is the server unsure of the clients identity until it
suppose some receivers in a large conference can receive data at a significantly higher bandwidth than others what