Probabilistic Treatment of MIXes to Hamper Traffic Analysis

  • Authors:
  • Dakshi Agrawal;Dogan Kesdogan;Stefan Penz

  • Affiliations:
  • -;-;-

  • Venue:
  • SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The goal of anonymity providing techniques is to preservethe privacy of users, who has communicated withwhom, for how long, and from which location, by hidingtraffic information. This is accomplished by organizing additionaltraffic to conceal particular communication relationshipsand by embedding the sender and receiver of amessage in their respective anonymity sets. If the number ofoverall participants is greater than the size of the anonymityset and if the anonymity set changes with time due to unsynchronizedparticipants, then the anonymity technique becomesprone to traffic analysis attacks. In this paper, we areinterested in the statistical properties of the disclosure attack,a newly suggested traffic analysis attack on the MIXes.Our goal is to provide analytical estimates of the number ofobservations required by the disclosure attack and to identifyfundamental (but avoidable) weak operational modes'of the MIXes and thus to protect users against a traffic analysisby the disclosure attack.