minx a simple and efficient mix packet formatpdf.pdfVIP

minx a simple and efficient mix packet formatpdf.pdf

  1. 1、本文档共15页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
minx a simple and efficient mix packet formatpdf

Minx: A Simple and Efficient Mix Packet Format George Danezis University of Cambridge, Computer Lab. (Thanks to CMI grant) Ben Laurie ALD Ltd. Outline ● What is a mix packet format – na?ve constructions ● Attacks against mix formats ● Minx – our construction ● Conclusions Warning: This talk abstracts away a lot of boring details – read the paper for full (gory) details. What is a mix? ● Building block for anonymous communications. ● Router that hides correspondences. ● Two components: – Changes the bit patterns using a secret – Distrupts the timing patterns – another subject altogether Mix Input message 1 Input message 2 Output message A Output message B What is a mix packet format? ● Cryptographic format that allows the bit patterns to change – so that it is hard to trace a message. – The sender encodes a message. – The mix decodes the message and sends it along. ● Na?ve construction: Secret K A to Mix: {B,M}PubK Mix Mix to B: M Anonymous replies ● Similar construction for anonymous reply blocks: ● Support for anonymous replies – Indistinguishable from normal messages. – Secure against all attacks. Secret K B to Mix: {A,KA}PubK,M Mix Mix to A: {M}KA Multiple Mixes ● Mix networks distribute trust and load. ● Use a chain of mixes instead of one: ● Strip the packet layer by layer ● Hide length of path / position Mix 1 Mix 2 Mix 3 A to Mix 1: {Mix 2,{B,M}PubK2}PubK1 Mix 1 to Mix 2: {B,M}PubK2 Mix 2 to B: M The real world – red in tooth and claw ● Na?ve examples so far would not stand a chance. ● Attacks: – Attacker can watch all packets coming in and out of mix. – The attacker controls a subset of nodes on the path. – Attacker can modify/tag messages to trace them – the killer attack. ● Example: Using AES CBC for encryption ... What if {.}K = AES CBC ● Use hybrid RSA / AES CBC to encrypt message: ● Attack: flip one bit of some input block Mix A to Mix: {B,Ks}PubK,{M}Ks RSA Mix to B: M RSA Surely this is trivial ... ● Other cryptographic constructions: – AES

文档评论(0)

l215322 + 关注
实名认证
文档贡献者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档