Network Interfaces

Part 2: Please give detailed answers to the questions below:

1. Can two network interfaces have the same IP address? Why or why not?

Don't use plagiarized sources. Get Your Custom Essay on
Network Interfaces
Just from $13/Page
Order Essay

2. Consider the following hashing algorithm. A binary block of length M is divided into subblocks of length 128 bits, and the last block is padded with zeros to a length of 128. The hash consists of the XOR of the resulting 128-bit vectors. Is this algorithm appropriate for encryption? Explain. .

3. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key. They also agree on two public numbers: q (large prime number), a (generator mod q): = 13a = 3

Alan generates a random RA =11.

Bill generates a random RB =19.

Note you need to show the calculation procedures step by step in (a)-(d).

a. What is the SA Alan sends to Bill ? (i.e. SA =? .

b. What is the SB Bill sends to Alan? (i.e. SB =? .

c. Show how Alan can calculate to obtain a common secret key. What is the common secret key? .

d. Show how Bill can calculate to obtain a common secret key. What is the common secret key?

ORDER NOW »»

and taste our undisputed quality.