The security provided to IP depends on the MD5 algorithm. The security of the MD5 algorithm depends on the structure of the IP datagram. This is a dependency loop, the sort of thing that one tries to avoid in secure software design.