[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] tweaks, plus a skeleton conclusion



Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc

Modified Files:
	minion-design.tex 
Log Message:
tweaks, plus a skeleton conclusion



Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -d -r1.20 -r1.21
--- minion-design.tex	5 May 2002 01:21:23 -0000	1.20
+++ minion-design.tex	5 May 2002 02:08:55 -0000	1.21
@@ -407,9 +407,11 @@
 look for resulting patterns.
 
 The attack is possible only if the adversary happens to own the crossover
-point --- and Alice chooses the crossover point. If Alice were sending
-only one message, then this multiple-message tagging attack also would
-not be possible. Thus Alice picks $k$ paths for sending her $n$
+point that Alice chooses.
+% If Alice were sending
+%only one message, then this multiple-message tagging attack also would
+%not be possible.
+Thus Alice picks $k$ paths for sending her $n$
 messages;\footnote{
   We can prevent the adversary from using divide-and-conquer on Alice's
   batches if Alice uses a hybrid path starting with a short cascade ---
@@ -424,8 +426,9 @@
 point, the tagging attack is equivalent to the dropping attack. The
 crossover point in question simply doesn't deliver the message to the
 second leg. Therefore, if the adversary doesn't own most of the crossover
-points that Alice's chooses, a successful multiple-message tagging attack
-is infeasible.
+points that Alice chooses, a successful multiple-message tagging attack is
+infeasible. We leave a security analysis of this multiple-paths approach
+to future work; but see Section \ref{subsec:choosing-paths}.
 
 \section{Related design decisions}
 
@@ -760,6 +763,7 @@
 \section{Maintaining anonymity sets}
 
 \subsection{Long-term nyms: how to choose paths for reply blocks}
+\label{subsec:choosing-paths}
 
 This question is hard. We're going to have to argue about it for a
 while more, I think.
@@ -852,6 +856,17 @@
 
 \section{Future Directions}
 \label{sec:conclusion}
+
+This design document represents the first step in peer review of the
+Type III remailer protocol. Many of the ideas, ranging from the core
+design to peripheral design choices, need more attention:
+
+\begin{itemize}
+\item We need to analyze the proposed defense against the multiple-message
+tagging attack.
+\end{itemize}
+
+
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%