[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Rearrange graphs; tweak captions.
Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv24974
Modified Files:
e2e-traffic.tex
Log Message:
Rearrange graphs; tweak captions.
Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -d -r1.45 -r1.46
--- e2e-traffic.tex 2 May 2004 21:58:57 -0000 1.45
+++ e2e-traffic.tex 2 May 2004 22:12:33 -0000 1.46
@@ -914,7 +914,7 @@
\begin{figure}
\begin{minipage}[t]{5.75cm}
\mbox{\epsfig{angle=0,figure=graphs/fig5a,width=6cm}}
-\caption{Independent geometric dummy messages: median rounds to guess all
+\caption{Independent geometric padding: median rounds to guess all
recipients}
\label{fig5a}
\end{minipage}
@@ -965,6 +965,21 @@
such an attacker is {\it not} delayed by increased variability in message
delays.
+\begin{figure}
+\begin{minipage}[t]{5.75cm}
+\mbox{\epsfig{angle=0,figure=graphs/fig5d,width=6cm}}
+\caption{Full padding, background known: median rounds to guess all recipients}
+\label{fig5d}
+\end{minipage}
+\hfill
+\begin{minipage}[t]{5.75cm}
+\mbox{\epsfig{angle=0,figure=graphs/fig6,width=6cm}}
+\caption{Partial observation: median rounds to guess all recipients}
+\label{fig6}
+\end{minipage}
+\hfill
+\end{figure}
+
\subsubsection{The impact of partial observation:}
%\label{subsec:sim-partial}
%trial 6
@@ -983,22 +998,6 @@
the attacker with probability $\Pobserve=f$. The attacker sees a message
when it enters {\it and} when it exits with probability $({\Pobserve})^2$.
-
-\begin{figure}
-\begin{minipage}[t]{5.75cm}
-\mbox{\epsfig{angle=0,figure=graphs/fig5d,width=6cm}}
-\caption{Perfect padding, prior background known: median rounds to guess all recipients}
-\label{fig5d}
-\end{minipage}
-\hfill
-\begin{minipage}[t]{5.75cm}
-\mbox{\epsfig{angle=0,figure=graphs/fig6,width=6cm}}
-\caption{Partial observation: median rounds to guess all recipients}
-\label{fig6}
-\end{minipage}
-\hfill
-\end{figure}
-
The results in Figure~\ref{fig6} show that the attacker can still implement a
long-term intersection attack even when he is only observing part of the
network. When most of the network is observed ($\Pobserve>70\%$ in our
@@ -1023,7 +1022,7 @@
Our model differs most from reality in four ways: First, real user behavior
is more complex than we have assumed. Second, user behavior changes over
time. Third, real messages often exhibit full or partial linkability (as
-described in section~\ref{subsec:strengthening}), which we have not
+described in section~\ref{subsec:strenghtening}), which we have not
simulated. Fourth, real attackers are not limited to passive observation.
We each of these points before.
% These need to get re-ordered. -NM
@@ -1036,7 +1035,7 @@
traffic patterns in actual mix-nets \cite{mixvreliable} suggests that this
variation is probably significant.
-In section~\ref{subsec:strengthening}, we briefly discuss how an attacker can
+In section~\ref{subsec:strenghtening}, we briefly discuss how an attacker can
try to handle a scenario where the background traffic changes slowly over
time, and perhaps a similar approach would also help against a sender whose
recipients were not constant. In the absence of a model for time-variant
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/