Problem
1. One feature of a firewall is its ability to stop an outgoing IP packet, remove the real IP address, insert a "fake" IP address, and send the packet on its way. How does this feature work? Do you think it would be effective?
2. How does the size of a key affect the strengths and weaknesses of an encryption technique? Consider both a friendly use of the key and an unfriendly use of the key.
3. Assume a key is 56 bits. If it takes a computer 0.00024 seconds to try each key, how long will it take to try all possible keys? What if 10,000 computers are working together to try all keys?