CSC 249 HW 9 Due Dec 1, 2014 We briefly discussed some of these questions in class. For those, I just want to be sure you all have a chance to revisit the issues and see if anything is unclear. Provide brief answers to all these questions. Chapter 6 discussion questions 1) What are the differences between the following types of wireless channel impairments: path loss, multipath propagation, interference from other sources? 2) Why are acknowledgments used in 802.11 but not in wired Ethernet? 3) Briefly describe the role of the beacon frames in 802.11. 4) Briefly describe the role of the RTS frame and corresponding CTS frame. 5) Suppose the IEEE 802.11 RTS and CTS frames were as long as the standard DATA and ACK frames. Would there be any advantage to using the CTS and RTS frames? Why or why not? Chapter 8 discussion questions 6) In what way does the public-key encrypted message hash provide a better digital signature than the public-key encrypted message? 7) Suppose Alice has a message that she is ready to send to anyone who asks. Thousands of people want to obtain Alice’s message, but each wants to be sure of the integrity of the message. In this context, do you think a MAC-based or a digital-signature-based integrity scheme is more suitable? Why? 8) What is the purpose of a nonce in an end-point authentication protocol? 9) What does it mean to say that a nonce is a once-in-a-lifetime value? How is the lifetime defined? 10) Suppose that Bob receives a PGP message from Alice. How does Bob know for sure that Alice created the message (rather than, say, Trudy)? Does PGP use a MAC for message integrity? 11) Suppose Bob initiates a TCP connection to Trudy who is pretending to be Alice. During the handshake, Trudy sends Bob Alice’s certificate. In what step of the SSL handshake algorithm will Bob discover that he is not communicating with Alice? Problem: The figure below shows the operations that Alice must perform with PGP to provide confidentiality, authentication, and integrity. Diagram the corresponding operations that Bob must perform on the package received from Alice. - KA m . H( ) - . KA( ) - KA(H(m)) + KS . KS( ) + m KS + . KB( ) K+ B + KB(KS ) Internet