Problem
1. Show how IKE reacts to the replay attack in the quick mode. That is, show how IKE responds to an attacker that tries to replay one or more messages in the quick mode.
2. Show how IP Sec reacts to a brute-force attack. That is, can an intruder do an exhaustive computer search to find the encryption key for IP Sec?