Download
point to point privacy n.
Skip this Video
Loading SlideShow in 5 Seconds..
Point-to-Point Privacy PowerPoint Presentation
Download Presentation
Point-to-Point Privacy

Point-to-Point Privacy

98 Vues Download Presentation
Télécharger la présentation

Point-to-Point Privacy

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Point-to-Point Privacy Bob Alice Eve • Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the encrypted communication and possibly sample original message (plaintext). • This type of privacy is typically achieved by applying an encryption standard such as the Advanced Encryption Standard (AES) to the specific communication.

  2. Network Privacy Eve • Protect the privacy a network from an eavesdropper (Eve) who can see the signals transmitted on the network. Prevent Eve from • Figuring out who is talking to whom. • Isolating a particular communication to begin a cryptographic attack on a particular conversation • Performing traffic analysis (who is talking to whom on a regular basis, etc)

  3. Security Benefit of UCLA OCDMA • UCLA OCDMA can provide point-to-point privacy as an added feature, but this can also be accomplished by well-known traditional techniques. • UCLA OCDMA provides network privacy by preventing an eavesdropper from knowing the source of a message from its wavelength or timeslot. • Network privacy enhances point-to-point privacy by providing a cryptographic obstacle to the isolation of a conversation that must be overcome before the eavesdropper can mount a cryptographic attack on the point-to-point communication.