[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] Wrap paragraphs that don"t fit in an 80 col terminal



Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv4202

Modified Files:
	minion-design.tex 
Log Message:
Wrap paragraphs that don't fit in an 80 col terminal

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -d -r1.12 -r1.13
--- minion-design.tex	2 May 2002 05:53:50 -0000	1.12
+++ minion-design.tex	2 May 2002 15:01:15 -0000	1.13
@@ -267,28 +267,30 @@
 
 \subsection{Link-level encryption and what it gets us}
 
-Unlike remailer types I and II that used SMTP as their underlying 
-transport mechanism, Mixminion clients and nodes communicate 
-using a forward secure encrypted channel based on TLS \cite{TLS}.
-TLS allows the establishment of an encrypted tunnel using ephemeral 
-Diffie-Hellman keys. In order to make sure that the receiving end is the 
-one intended by the creator of the anonymous message, the ephemeral key could be 
-signed by the receiving node. As soon as a session key has been established 
-the Diffie-Hellman keys are destroyed and messages start being sent through the
-tunnel. After each message a standard key update operation is performed to generate 
-a new key and the old key material is deleted. Key updates don't use any
-asymmetric encryption techniques, so they are quite fast.
+Unlike remailer types I and II that used SMTP as their underlying
+transport mechanism, Mixminion clients and nodes communicate using a
+forward secure encrypted channel based on TLS \cite{TLS}.  TLS allows
+the establishment of an encrypted tunnel using ephemeral
+Diffie-Hellman keys. In order to make sure that the receiving end is
+the one intended by the creator of the anonymous message, the
+ephemeral key could be signed by the receiving node. As soon as a
+session key has been established the Diffie-Hellman keys are destroyed
+and messages start being sent through the tunnel. After each message a
+standard key update operation is performed to generate a new key and
+the old key material is deleted. Key updates don't use any asymmetric
+encryption techniques, so they are quite fast.
 
-The above scheme offers forward secrecy in the sense that even the nodes 
-that exchange messages are not able to decrypt or even recognize 
-messages that might have been intercepted on the links. This makes it impossible 
-to comply with decryption notices that might be served in some jurisdiction.
-It also makes it necessary for an adversary to corrupt and control nodes in order
-to have enough information to trace back a forward anonymous communication by 
-requesting nodes to decrypt it. (Reply blocks can still be used for this purpose.)
-Even if an attacker manages to get hold of the session key at a particular point
-they would have to observe all subsequent traffic to be able to update their key
-appropriately. 
+The above scheme offers forward secrecy in the sense that even the
+nodes that exchange messages are not able to decrypt or even recognize
+messages that might have been intercepted on the links. This makes it
+impossible to comply with decryption notices that might be served in
+some jurisdiction.  It also makes it necessary for an adversary to
+corrupt and control nodes in order to have enough information to trace
+back a forward anonymous communication by requesting nodes to decrypt
+it. (Reply blocks can still be used for this purpose.)  Even if an
+attacker manages to get hold of the session key at a particular point
+they would have to observe all subsequent traffic to be able to update
+their key appropriately.
 
 The forward secure encrypted channel offers only limited protection
 against traffic analysis. Encrypted links between honest nodes prevent