In this chapter we have described sequence numbers between a sender and receiver as a way to protect a communication stream against substitution and replay attacks. Describe a situation in which an attacker can substitute or replay in spite of sequence numbers. For which type of sequence numbering—one general stream of sequence numbers or a separate stream for each pair of communicators—is this attack effective?

What will be an ideal response?

The attacker uses a message from one session, containing sequence numberx and attempts to insert/replay it with another session, assuming that sequence numberx will be valid in the new session. This kindof attack only works against the separate stream for each pair of communicators, assuming the messages do not contain a session ID.

Computer Science & Information Technology

You might also like to view...

Goal Seek is a form of conditional formatting

Indicate whether the statement is true or false

Computer Science & Information Technology

Storage locations in an array are known as __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology