Third-parties applied to traffic direction analysis

C. Lu, Jhing-Fa Wang, Yitao Song
{"title":"Third-parties applied to traffic direction analysis","authors":"C. Lu, Jhing-Fa Wang, Yitao Song","doi":"10.1109/GDN.1993.336568","DOIUrl":null,"url":null,"abstract":"Traffic analysis is the inference of information (for example, presence, absence, amount, direction and frequency) from the observation of traffic flows. This paper proposes a third-parties method to avoid the traffic direction analysis. The third parties are those network users whose obligation is 20 redirect received messages to next third party. All the messages are encrypted by the same public key cryptosystem and composed of three message elements. The first message element is a random number which is added to prevent the reconstruction attack. The second message element is used to identify the next third party. The third message element is passed to the next third party identified by the second one. The next third party will follow the same process as above. The number of the third parties as determined by the original sender in the session. But all of the third parties don't recognize the original sender, real receiver, and the data sent from the original sender. The security level is as good as the public key cryptosystem which the third-party method is employed.<<ETX>>","PeriodicalId":206154,"journal":{"name":"First IEEE Symposium on Global Data Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First IEEE Symposium on Global Data Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GDN.1993.336568","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Traffic analysis is the inference of information (for example, presence, absence, amount, direction and frequency) from the observation of traffic flows. This paper proposes a third-parties method to avoid the traffic direction analysis. The third parties are those network users whose obligation is 20 redirect received messages to next third party. All the messages are encrypted by the same public key cryptosystem and composed of three message elements. The first message element is a random number which is added to prevent the reconstruction attack. The second message element is used to identify the next third party. The third message element is passed to the next third party identified by the second one. The next third party will follow the same process as above. The number of the third parties as determined by the original sender in the session. But all of the third parties don't recognize the original sender, real receiver, and the data sent from the original sender. The security level is as good as the public key cryptosystem which the third-party method is employed.<>
第三方应用于流量方向分析
交通分析是从对交通流的观察中推断出信息(如存在、不存在、数量、方向和频率)。本文提出了一种避免流量方向分析的第三方方法。第三方是那些网络用户,他们的义务是将收到的消息重定向到下一个第三方。所有消息都由相同的公钥密码系统加密,并由三个消息元素组成。第一个消息元素是一个随机数,添加它是为了防止重构攻击。第二个消息元素用于标识下一个第三方。第三个消息元素被传递给由第二个消息元素标识的下一个第三方。下一个第三方将遵循上述相同的过程。由会话中的原始发送方确定的第三方的数目。但是所有的第三方都不能识别原始发送者、真正的接收者和原始发送者发送的数据。安全级别与采用第三方方法的公钥密码系统相当。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信