{"title":"Third-parties applied to traffic direction analysis","authors":"C. Lu, Jhing-Fa Wang, Yitao Song","doi":"10.1109/GDN.1993.336568","DOIUrl":null,"url":null,"abstract":"Traffic analysis is the inference of information (for example, presence, absence, amount, direction and frequency) from the observation of traffic flows. This paper proposes a third-parties method to avoid the traffic direction analysis. The third parties are those network users whose obligation is 20 redirect received messages to next third party. All the messages are encrypted by the same public key cryptosystem and composed of three message elements. The first message element is a random number which is added to prevent the reconstruction attack. The second message element is used to identify the next third party. The third message element is passed to the next third party identified by the second one. The next third party will follow the same process as above. The number of the third parties as determined by the original sender in the session. But all of the third parties don't recognize the original sender, real receiver, and the data sent from the original sender. The security level is as good as the public key cryptosystem which the third-party method is employed.<<ETX>>","PeriodicalId":206154,"journal":{"name":"First IEEE Symposium on Global Data Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First IEEE Symposium on Global Data Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GDN.1993.336568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Traffic analysis is the inference of information (for example, presence, absence, amount, direction and frequency) from the observation of traffic flows. This paper proposes a third-parties method to avoid the traffic direction analysis. The third parties are those network users whose obligation is 20 redirect received messages to next third party. All the messages are encrypted by the same public key cryptosystem and composed of three message elements. The first message element is a random number which is added to prevent the reconstruction attack. The second message element is used to identify the next third party. The third message element is passed to the next third party identified by the second one. The next third party will follow the same process as above. The number of the third parties as determined by the original sender in the session. But all of the third parties don't recognize the original sender, real receiver, and the data sent from the original sender. The security level is as good as the public key cryptosystem which the third-party method is employed.<>