[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[freehaven-cvs] s/MIX/mix/
Update of /home/freehaven/cvsroot/doc/batching-taxonomy
In directory moria.seul.org:/home/arma/work/freehaven/doc/batching-taxonomy
Modified Files:
taxonomy.tex
Log Message:
s/MIX/mix/
Index: taxonomy.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/batching-taxonomy/taxonomy.tex,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- taxonomy.tex 8 May 2002 00:07:02 -0000 1.8
+++ taxonomy.tex 8 May 2002 00:11:10 -0000 1.9
@@ -906,14 +906,14 @@
Link encryption offers some limited protection against traffic
analysis. Encrypted links between honest nodes prevent an adversary
from recognizing even his own messages, thus making it harder to flood
-MIXes and watch where outgoing messages go. However, since the adversary
+mixes and watch where outgoing messages go. However, since the adversary
performing the flooding attack can choose the next destination of each
message, he may still be able to recognize his messages. At the extreme,
he can direct all his chaff messages at the same next mix, so any other
message will still stand out. A good link padding scheme may be able to
further frustrate him, but much more research remains.
-Babel \cite{Babel} introduces \emph{inter-MIX detours}, a scheme where mix
+Babel \cite{Babel} introduces \emph{inter-mix detours}, a scheme where mix
nodes can choose to rewrap a message and send it through a few randomly
chosen new hops --- so even the sender cannot be sure of recognizing
his message as it leaves the mix. This approach could help complicate
@@ -939,7 +939,7 @@
assumptions -- that the attacker cannot mount a distributed $n-1$
attack where the hostile messages come from different users.
%It cannot be used in mix networks.
-Unfortunately, it seems very hard to reuse this idea in free-route mix
+Unfortunately, it seems very hard to reuse this idea in free route
networks, since there is no centralized input location at which we can do
authentication; compromised mixes could claim to have done authentication
on traffic they instead generate themselves.
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/