Questions tagged [traffic-analysis]

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. Within cryptography this definition is restricted to deduce information from the cryptographic properties of the messages send, for instance if a signature or ciphertext leaks information that could be of use to an attacker.

8 questions
2
votes
1 answer

How is Encryption Actually Used in Public Networks at This Moment?

Has anyone done a study, assembled a snapshot, of how encryption is actually being used on the Internet at this moment? So many companies do traffic analysis, the usage share of operating systems, etc., and one imagines that national-level agencies…
Patriot
  • 3,162
  • 3
  • 20
  • 66
2
votes
1 answer

What can be learned from an encrypted text?

I assume nowadays crypto algorithms are well-built, so one can't make a difference between a ciphertext and random bit stream. This way the method used for encryption can't be figured out either. I am curious, if there is perhaps something else that…
user41801
  • 23
  • 3
1
vote
0 answers

Combating Traffic analysis Msc Dissertation ideas

I have started my MSc dissertation on anonymity (how to beat traffic analysis techniques) and i'm looking for practical ideas. What tactics and software technology would be that guarantees private and confidential access to the web? Any help will…
user46000
  • 11
  • 2
0
votes
0 answers

How to protect traffic metadata from a malicious cloud provider?

What can be a theoretical and efficient way of protecting traffic metadata (packet size, timestamps, packet count) of enterprise when traffic is redirected to the SGX enclave residing in a cloud provider for processing. I have setup an IPSEC tunnel…
ENIO MARKU
  • 21
  • 1
0
votes
1 answer

Are there cryptographic schemes that mask as unencrypted traffic?

Are there cryptographic schemes that make encrypted traffic look like unencrypted traffic?
Geremia
  • 625
  • 1
  • 5
  • 12
0
votes
1 answer

Possible to know who is the owner of a message encrypted with RSA public key

Given the scenario in which I want to send 10 messages either to Stalio or Olio. I encrypt these messages with their respective public keys using textbook RSA, before sending the messages to their recipients. Can an attacker - by knowing only the…
user20043
0
votes
0 answers

What block cipher should I use for encrypting GCM initialization vector counter-based nonce?

I'm implementing a mobile VPN product based on AES-GCM that should be resistant against fingerprinting the movements of mobile nodes. A difficulty is that the mobile nodes may not have the best possible random number generators, so a random nonce…
juhist
  • 1,643
  • 1
  • 13
  • 18
-1
votes
1 answer

Safe way to generate different encrypted output from the "same" plaintext

Imagine I want to send imaginary defcon levels to another party over the internet. I know there are good protocols for this like SSL, but lets say I only have a blackbox tool where I can input an AES key, and a plaintext. The output of the box is…
user3231622
  • 145
  • 3