Title
Message splitting against the partial adversary
Abstract
We review threat models used in the evaluation of anonymity systems' vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packets have to be sent through these systems, more anonymity can be achieved if senders route the packets via different paths. This is in contrast to the normal technique of using the same path for them all. We comment on the implications of this for message-based and connection-based anonymity systems. We then proceed to examine the only remaining traffic analysis attack – one which considers the entire system as a black box. We show that it is more difficult to execute than the literature suggests, and attempt to empirically estimate the parameters of the Mixmaster and the Mixminion systems needed in order to successfully execute the attack.
Year
DOI
Venue
2005
10.1007/11767831_3
Privacy Enhancing Technologies
Keywords
Field
DocType
connection-based anonymity system,multiple packet,traffic analysis,mixminion system,normal technique,different path,entire system,message splitting,black box,remaining traffic analysis attack,partial adversary,anonymity system
Black box (phreaking),Traffic analysis,Internet privacy,Confidentiality,Computer security,Adversary model,Computer science,Threat model,Network packet,Adversary,Anonymity,Distributed computing
Conference
Volume
ISSN
ISBN
3856
0302-9743
3-540-34745-3
Citations 
PageRank 
References 
6
0.87
15
Authors
2
Name
Order
Citations
PageRank
Andrei Serjantov168161.12
Steven J. Murdoch280657.90