------------------------------------------------------------------------------ Mohamed G. Gouda Network Protocol Security CS 395T HW3 Solution ------------------------------------------------------------------------------ 1. Let u be a source and v be a destination. Also let B.tmp be a public key of u chosen for this occasion. Email: u -> mix : B.mix, B.tmp>,v> mix -> v : B.v, B.tmp> Reply: v -> mix' : B.mix', B.tmp, B.tmp mix' -> u : B.tmp> ------------------------------------------------------------------------------- 2. See the following link: http://www.cs.utexas.edu/users/gouda/problem2.pdf ------------------------------------------------------------------------------- 3. Algorithm (mixed-match to first-match) Input : A mixed-match firewall f output : A first-match firewall f' Let f' be a first-match firewall that has no rule initially. Also let f" be a temporary firewall that has no rule initially. For each rule r in f from the first rule to the last rule, if rule r has label F, then add r to the end of f', else if rule r has label L, then add r to the end of f". For each rule r in f" from the last rule to the first rule, add r to the end of f'