Packet Cloaking: Protecting Receiver Privacy Against Traffic Analysis

  • Authors:
  • Reynold Cheng;David K. Y. Yau;Jianyun Fu

  • Affiliations:
  • Dept of Computing, Hong Kong Polytechnic U, Hung Hom, Hong Kong, csckcheng@comp.polyu.edu.hk;Dept of Computer Science, Purdue University, IN 47907, USA, Email: yau@cs.purdue.edu;Dept of Computing, Hong Kong Polytechnic U, Hung Hom, Hong Kong, csjfu@comp.polyu.edu.hk

  • Venue:
  • NPSEC '07 Proceedings of the 2007 3rd IEEE Workshop on Secure Network Protocols
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...