Homework #4
Due: May 24, 2013
Points: 100
Questions
- (30 points) Consider a scheme that allows a recipient to reply to a message from a chain of Cypherpunk remailers. Assume that encipherment is used throughout the chain.
- Bob selects a chain of remailers for the return path. He creates a set of keys and enciphers them so that only the key for the current remailer is visible to that remailer. Design a technique by which he could accomplish this. Describe how he would include this data in his message.
- How should Alice’s mailer handle the processing of the return address information?
- When Bob receives the reply, what does it contain? How can he obtain the cleartext reply?
(text, problem 14.3)
- (30 points) Revisit the example for x := y + z in Section 16.1.1. Assume that x does not exist in state s. Confirm that information flows from y and z to x by computing H(ys | xt), H(ys), H(zs | xt), and H(zs) and showing that H(ys | xt) < H(ys) and H(zs | xt) < H(zs)
(text, problem 16.1)
- (20 points) Let L = (SL, <L) be a lattice. Prove that the structure IL = (SIL, <IL) is a lattice, given the following definitions:
- SIL = { [a, b] | a, b ∈ S ∧ a <L b }
- <IL = { ([a1, b1], [a2, b2]) | a1 <L a2 ∧ b1 <L b2 }
- lubIL([a1, b1], [a2, b2]) = (lubL(a1, a2), lubL(b1, b2))
- glbIL([a1, b1], [a2, b2]) = (glbL(a1, a2), glbL(b1, b2))
(text, problem 16.2, modified)
- (20 points) Why can we omit the requirement lub(i, b[i]) < a[i] from the requirements for secure information flow in the example for iterative statements (see Section 16.3.2.4)?
(text, problem 16.5)
Extra Credit
- (30 points) Prove that a system that meets the definition of generalized noninterference security also meets the definition of deducible security.
(text, problem 8.6)