Networks without user observability—design options

  • Authors:
  • A Pfitzmann;M Waidner

  • Affiliations:
  • -;-

  • Venue:
  • Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
  • Year:
  • 1986

Quantified Score

Hi-index 0.00

Visualization

Abstract

In usual communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate (traffic analysis), even if the users employ end-to-end encryption. When ISDNs are used for almost everything, this becomes a severe threat. Therefore, we summarize basic concepts to keep the recipient and sender or at least their relationship unobservable, consider some possible implementations and necessary hierarchical extensions, and propose some suitable performance and reliability enhancements.