1 / 3

Point-to-Point Privacy

Point-to-Point Privacy. Bob. Alice. Eve. Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the encrypted communication and possibly sample original message (plaintext).

Télécharger la présentation

Point-to-Point Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Point-to-Point Privacy Bob Alice Eve • Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the encrypted communication and possibly sample original message (plaintext). • This type of privacy is typically achieved by applying an encryption standard such as the Advanced Encryption Standard (AES) to the specific communication.

  2. Network Privacy Eve • Protect the privacy a network from an eavesdropper (Eve) who can see the signals transmitted on the network. Prevent Eve from • Figuring out who is talking to whom. • Isolating a particular communication to begin a cryptographic attack on a particular conversation • Performing traffic analysis (who is talking to whom on a regular basis, etc)

  3. Security Benefit of UCLA OCDMA • UCLA OCDMA can provide point-to-point privacy as an added feature, but this can also be accomplished by well-known traditional techniques. • UCLA OCDMA provides network privacy by preventing an eavesdropper from knowing the source of a message from its wavelength or timeslot. • Network privacy enhances point-to-point privacy by providing a cryptographic obstacle to the isolation of a conversation that must be overcome before the eavesdropper can mount a cryptographic attack on the point-to-point communication.

More Related