[Cryptography] traffic analysis

Richard Outerbridge outer at sympatico.ca
Wed Jan 28 13:59:55 EST 2015

> On 2015-01-28 (28), at 10:10:18, ianG <iang at iang.org> wrote:

> [….]

> Doing traffic obfuscation by filling out is an expensive solution when the rest of the world spends most of its time trying to optimise.

What is the mechanism for separating the wheat from the chaff?

If we have a continually full channel full of fulsome noise, how does the receiver
distinguish valid traffic from nothing? Are there false positive & false negative
rates at play here? Presumably both would have to be dialled down to be pretty low.

Which as we all know is pretty much impossible.

More information about the cryptography mailing list