[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] Turn a lot of fragments into sentences, fix some typ...



Update of /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable
In directory moria.mit.edu:/tmp/cvs-serv5614

Modified Files:
	mixvreliable.tex 
Log Message:
Turn a lot of fragments into sentences, fix some typos.


Index: mixvreliable.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable/mixvreliable.tex,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -d -r1.16 -r1.17
--- mixvreliable.tex	29 Jun 2004 00:39:06 -0000	1.16
+++ mixvreliable.tex	29 Jun 2004 00:56:05 -0000	1.17
@@ -164,7 +164,7 @@
 
 Reliable interoperates with Mixmaster on the protocol level by using the
 Mixmaster message format for packet transfer. Reliable uses a variant of
-the \emph{S-G Mix} design. In Reliable, the delay may be chosen by the
+the \emph{S-G mix} design. In Reliable, the delay may be chosen by the
 user from an exponential distribution of mean one hour. If the user
 does not provide any delay to the mix, then the mix itself picks a
 delay from a uniform distribution, being the maximum and minimum of
@@ -553,7 +553,7 @@
 area~\cite{trusting-trust}.
 
 This paper does not aim to be an in-depth analysis of the full spectrum of
-host-attacks against remailer nodes, Nevertheless, it is important to
+host-attacks against remailer nodes. Nevertheless, it is important to
 mention some significant differences between Reliable and Mixmaster which
 may affect their ability to provide adequate anonymity for their users.
 
@@ -632,7 +632,7 @@
 While the most critical factor in the creation of secure code is the
 manner in which it is written, some languages lend themselves to greater
 risk of exploitable mistakes. An inexperienced or unskilled programmer
-will always be able to make an application insecure. The choice of
+will always be in danger of making an application insecure. The choice of
 programming language merely sets the bar for the required level of
 experience and ability necessary to develop applications in that language
 safely. Thus, when evaluating the likelihood of the existence of
@@ -763,8 +763,9 @@
 
 \subsection{Network timing attacks}
 
-Packet counting, deduction of pool variables by timing observation.
-Affects pool-mixes more than s-g mixes, possibly aids attacker in some
+By analysing the input and output traffic of a mix, a skilled attacker may
+be able to deduce the value of pool variables by timing observation. This
+affects pool-mixes more than S-G mixes, and possibly aids attacker in some
 non-host based active attacks such as $(n-1)$ attacks. The anonymity
 strength of a remailer should not require pool values to be hidden, and
 countermeasures to this class of active attacks should be
@@ -796,7 +797,7 @@
 We have shown that Mixmaster provides higher average anonymity than
 Reliable for the same input and same average delay. Due to its nature as a
 pool mix, Mixmaster provides higher delays than Reliable in low traffic
-conditions. Comparatively, due to the nature of S-G Mixes, Reliable's
+conditions. Comparatively, due to the nature of S-G mixes, Reliable's
 delay is not dependent on the traffic.
 
 In addition, we have identified a number of key points of attack and

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/