[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] e2e: a few final tweaks



Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/e2e-traffic

Modified Files:
	e2e-traffic.tex 
Log Message:
e2e: a few final tweaks


Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -d -r1.35 -r1.36
--- e2e-traffic.tex	26 Jan 2004 02:42:16 -0000	1.35
+++ e2e-traffic.tex	27 Jan 2004 02:32:52 -0000	1.36
@@ -48,7 +48,7 @@
 \begin{abstract}
 We extend earlier research on mounting and resisting passive
 long-term end-to-end traffic analysis attacks against anonymous message
-systems
+systems,
 % We relax the assumptions of earlier attacks
 by describing how an
 eavesdropper can learn sender-receiver connections even when the substrate
@@ -58,7 +58,8 @@
 message distinguishability to speed the attack.
 Finally, we simulate our attacks for a variety of
 scenarios, focusing on the amount of information needed to link senders to
-their recipients.
+their recipients. In each scenario, we show that the intersection attack
+can still succeed, albeit more slowly.
 \end{abstract}
 
 %======================================================================
@@ -66,7 +67,7 @@
 \label{sec:intro}
 Mix networks aim to allow senders to anonymously deliver messages to
 recipients. One of the strongest attacks against current deployable
-mix network designs is the \emph{long-term intersection attack}. In
+designs is the \emph{long-term intersection attack}. In
 this attack, a passive eavesdropper observes a large volume of network
 traffic and notices that certain recipients are more likely to receive
 messages after given senders have transmitted messages.
@@ -127,9 +128,9 @@
 increases the amount of traffic he must observe.
 
 Additionally, we show how an attacker can exploit additional knowledge, such
-as distinguishability between messages, to speed up these attacks.  For
+as distinguishability between messages, to speed these attacks.  For
 example, the attacker can take into account whether messages are written in
-the same language or signed by the same pseudonym to partition them into
+the same language or signed by the same pseudonym, to partition them into
 different classes and analyze the classes independently.
 %\item {\it A priori} suspicion of certain messages having originated
 %  or not originated from Alice.  For example, messages written in a

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/