[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[freehaven-cvs] added "Obscuring messages as they leave the mix" sub...



Update of /home/freehaven/cvsroot/doc/batching-taxonomy
In directory moria.seul.org:/home/arma/work/freehaven/doc/batching-taxonomy

Modified Files:
	taxonomy.tex 
Log Message:
added 'Obscuring messages as they leave the mix' subsec



Index: taxonomy.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/batching-taxonomy/taxonomy.tex,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -d -r1.5 -r1.6
--- taxonomy.tex	7 May 2002 08:41:07 -0000	1.5
+++ taxonomy.tex	7 May 2002 13:24:33 -0000	1.6
@@ -841,7 +841,7 @@
 this tradeoff between protection from blending attacks and protection
 from verifiability.
 
-\section{Cover Traffic}
+\subsection{Cover Traffic}
 
 Another possible protection against the blending attacks is cover
 traffic. Indeed, in designing the Mixmaster system \cite{Cott94},
@@ -888,7 +888,27 @@
 with the Mixmaster cover traffic policy, a threshold mix network can
 be attacked in $\epsilon$ time (but a very large number of messages).
 
-\section{Related Work}
+\subsection{Obscuring messages as they leave the mix}
+
+Link encryption offers some limited protection against traffic
+analysis. Encrypted links between honest nodes prevent an adversary
+from recognizing even his own messages, thus making it harder to flood
+MIXes and watch where outgoing messages go. However, since the adversary
+performing the flooding attack can choose the next destination of each
+message, he may still be able to recognize his messages. At the extreme,
+he can direct all his chaff messages at the same next mix, so any other
+message will still stand out. A good link padding scheme may be able to
+further frustrate him, but much more research remains.
+
+Babel \cite{babel} introduces \emph{inter-MIX detours}, a scheme where mix
+nodes can choose to rewrap a message and send it through a few randomly
+chosen new hops --- so even the sender cannot be sure of recognizing
+his message as it leaves the mix. This approach could help complicate
+blending attacks; we leave its analysis for future work.
+
+
+\section{Related work: stop and go mixes}
+% this is fishy. the related work section has only one related work? -RRD
 \label{SG}
 
 While active attacks have been widely cited in the literature and

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/