[Cryptography] traffic analysis

Jerry Leichter leichter at lrw.com
Tue Jan 27 16:33:18 EST 2015


On Jan 27, 2015, at 3:23 PM, Ben Laurie <benl at google.com> wrote:
> Different network designs can also help.  If you own the link and both of its ends, it costs you exactly the same to send continuous random bits as to leave the line idle.  Any encrypted traffic (assuming an encryptor whose output is indistinguishable from random noise() is then safe from observation.  The Hot Line between the US and Moscow was, I believe, designed to work this way.  How this extends to a packet-switched network, especially one where you can't trust the switches, is unclear.
> 
> Yeah, but ... who can realistically afford that bandwidth? To every possible recipient? Clearly you have to make a tradeoff.
Just my point.  We don't have a theory that would allow us to make the tradeoff in a rational way; we can only guess.
                                                        -- Jerry


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150127/67c2e714/attachment.html>


More information about the cryptography mailing list