[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Turn a lot of fragments into sentences, fix some typ...
Update of /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable
In directory moria.mit.edu:/tmp/cvs-serv5614
Modified Files:
mixvreliable.tex
Log Message:
Turn a lot of fragments into sentences, fix some typos.
Index: mixvreliable.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable/mixvreliable.tex,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -d -r1.16 -r1.17
--- mixvreliable.tex 29 Jun 2004 00:39:06 -0000 1.16
+++ mixvreliable.tex 29 Jun 2004 00:56:05 -0000 1.17
@@ -164,7 +164,7 @@
Reliable interoperates with Mixmaster on the protocol level by using the
Mixmaster message format for packet transfer. Reliable uses a variant of
-the \emph{S-G Mix} design. In Reliable, the delay may be chosen by the
+the \emph{S-G mix} design. In Reliable, the delay may be chosen by the
user from an exponential distribution of mean one hour. If the user
does not provide any delay to the mix, then the mix itself picks a
delay from a uniform distribution, being the maximum and minimum of
@@ -553,7 +553,7 @@
area~\cite{trusting-trust}.
This paper does not aim to be an in-depth analysis of the full spectrum of
-host-attacks against remailer nodes, Nevertheless, it is important to
+host-attacks against remailer nodes. Nevertheless, it is important to
mention some significant differences between Reliable and Mixmaster which
may affect their ability to provide adequate anonymity for their users.
@@ -632,7 +632,7 @@
While the most critical factor in the creation of secure code is the
manner in which it is written, some languages lend themselves to greater
risk of exploitable mistakes. An inexperienced or unskilled programmer
-will always be able to make an application insecure. The choice of
+will always be in danger of making an application insecure. The choice of
programming language merely sets the bar for the required level of
experience and ability necessary to develop applications in that language
safely. Thus, when evaluating the likelihood of the existence of
@@ -763,8 +763,9 @@
\subsection{Network timing attacks}
-Packet counting, deduction of pool variables by timing observation.
-Affects pool-mixes more than s-g mixes, possibly aids attacker in some
+By analysing the input and output traffic of a mix, a skilled attacker may
+be able to deduce the value of pool variables by timing observation. This
+affects pool-mixes more than S-G mixes, and possibly aids attacker in some
non-host based active attacks such as $(n-1)$ attacks. The anonymity
strength of a remailer should not require pool values to be hidden, and
countermeasures to this class of active attacks should be
@@ -796,7 +797,7 @@
We have shown that Mixmaster provides higher average anonymity than
Reliable for the same input and same average delay. Due to its nature as a
pool mix, Mixmaster provides higher delays than Reliable in low traffic
-conditions. Comparatively, due to the nature of S-G Mixes, Reliable's
+conditions. Comparatively, due to the nature of S-G mixes, Reliable's
delay is not dependent on the traffic.
In addition, we have identified a number of key points of attack and
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/