Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. Within cryptography this definition is restricted to deduce information from the cryptographic properties of the messages send, for instance if a signature or ciphertext leaks information that could be of use to an attacker.
Questions tagged [traffic-analysis]
8 questions
2
votes
1 answer
How is Encryption Actually Used in Public Networks at This Moment?
Has anyone done a study, assembled a snapshot, of how encryption is actually being used on the Internet at this moment?
So many companies do traffic analysis, the usage share of operating systems, etc., and one imagines that national-level agencies…
Patriot
- 3,162
- 3
- 20
- 66
2
votes
1 answer
What can be learned from an encrypted text?
I assume nowadays crypto algorithms are well-built, so one can't make a difference between a ciphertext and random bit stream. This way the method used for encryption can't be figured out either.
I am curious, if there is perhaps something else that…
user41801
- 23
- 3
1
vote
0 answers
Combating Traffic analysis Msc Dissertation ideas
I have started my MSc dissertation on anonymity (how to beat traffic analysis techniques) and i'm looking for practical ideas. What tactics and software technology would be that guarantees private and confidential access to the web?
Any help will…
user46000
- 11
- 2
0
votes
0 answers
How to protect traffic metadata from a malicious cloud provider?
What can be a theoretical and efficient way of protecting traffic metadata (packet size, timestamps, packet count) of enterprise when traffic is redirected to the SGX enclave residing in a cloud provider for processing. I have setup an IPSEC tunnel…
ENIO MARKU
- 21
- 1
0
votes
1 answer
Are there cryptographic schemes that mask as unencrypted traffic?
Are there cryptographic schemes that make encrypted traffic look like unencrypted traffic?
Geremia
- 625
- 1
- 5
- 12
0
votes
1 answer
Possible to know who is the owner of a message encrypted with RSA public key
Given the scenario in which I want to send 10 messages either to Stalio or Olio. I encrypt these messages with their respective public keys using textbook RSA, before sending the messages to their recipients.
Can an attacker - by knowing only the…
user20043
0
votes
0 answers
What block cipher should I use for encrypting GCM initialization vector counter-based nonce?
I'm implementing a mobile VPN product based on AES-GCM that should be resistant against fingerprinting the movements of mobile nodes. A difficulty is that the mobile nodes may not have the best possible random number generators, so a random nonce…
juhist
- 1,643
- 1
- 13
- 18
-1
votes
1 answer
Safe way to generate different encrypted output from the "same" plaintext
Imagine I want to send imaginary defcon levels to another party over the internet. I know there are good protocols for this like SSL, but lets say I only have a blackbox tool where I can input an AES key, and a plaintext. The output of the box is…
user3231622
- 145
- 3