Skip to content

Commit

Permalink
emphasized that the indistinguishability we want is for nodes,
Browse files Browse the repository at this point in the history
not just a passive observer. (the latter is pretty easy to get.)
  • Loading branch information
Roger Dingledine committed May 8, 2002
1 parent e05623e commit 5e31893
Showing 1 changed file with 8 additions and 15 deletions.
23 changes: 8 additions & 15 deletions minion-design.tex
Expand Up @@ -54,9 +54,9 @@
\begin{abstract} \begin{abstract}


We present Mixminion, a message-based anonymous remailer protocol that We present Mixminion, a message-based anonymous remailer protocol that
supports secure single-use reply blocks. Mixminion reply messages are supports secure single-use reply blocks. MIX nodes cannot distinguish
indistinguishable from forward messages, allowing forward and reply Mixminion reply messages from forward messages, so forward and reply
messages to share messages share
the same anonymity set. We add directory servers that allow users to the same anonymity set. We add directory servers that allow users to
learn public keys and performance statistics of participating remailers, learn public keys and performance statistics of participating remailers,
and we describe nymservers that allow users to maintain long-term and we describe nymservers that allow users to maintain long-term
Expand Down Expand Up @@ -302,8 +302,8 @@ \section{The MIX-net Design}
Mixminion therefore provides only \emph{single-use} reply blocks. Since Mixminion therefore provides only \emph{single-use} reply blocks. Since
replies may be very rare relative to forward messages, and thus replies may be very rare relative to forward messages, and thus
much easier to trace, the Mixminion protocol makes reply messages much easier to trace, the Mixminion protocol makes reply messages
indistinguishable from forward messages. Thus forward and reply messages indistinguishable from forward messages even for the MIX nodes. Thus
can share the same anonymity set. forward and reply messages can share the same anonymity set.


\subsection{Batching Strategy and Network Structure} \subsection{Batching Strategy and Network Structure}
\label{subsec:batching} \label{subsec:batching}
Expand Down Expand Up @@ -417,10 +417,8 @@ \subsection{Indistinguishable replies}
By making forward messages and replies indistinguishable, we prevent an By making forward messages and replies indistinguishable, we prevent an
adversary from dividing the message anonymity sets into two classes. In adversary from dividing the message anonymity sets into two classes. In
particular, if replies are infrequent relative to forward messages, particular, if replies are infrequent relative to forward messages,
an adversary who controls an adversary who controls some of the MIXes can more easily trace the
some of the MIXes can more easily trace the path of each reply: even path of each reply.
though the batches may be large, the number of replies in each batch
will be quite small.


Having indistinguishable replies, however, creates new attacks. In Having indistinguishable replies, however, creates new attacks. In
Mixmaster, senders ensure message integrity by including a hash of Mixmaster, senders ensure message integrity by including a hash of
Expand Down Expand Up @@ -521,12 +519,6 @@ \subsection{Indistinguishable replies}
\subsection{Defenses against tagging attacks} \subsection{Defenses against tagging attacks}
\label{subsec:tagging} \label{subsec:tagging}


% We never define what a tagging attack is. -Nick
% Yes we do. This following paragraph does, give or take. Should
% we say more? -RRD
% We never actually said that the attack described is a tagging
% attack.

Without the crossover point, an adversary could mount a \emph{tagging Without the crossover point, an adversary could mount a \emph{tagging
attack} by modifying (``tagging'') the payload of a forward message as attack} by modifying (``tagging'') the payload of a forward message as
it leaves Alice, and recognizing it later when it reaches Bob. it leaves Alice, and recognizing it later when it reaches Bob.
Expand Down Expand Up @@ -602,6 +594,7 @@ \subsection{Defenses against tagging attacks}
crossover point cannot know if it's processing a reply or forward message. crossover point cannot know if it's processing a reply or forward message.
The protocol doesn't allow a MIX to know its location in the path (other The protocol doesn't allow a MIX to know its location in the path (other
than the exit node), or the total length of the route. than the exit node), or the total length of the route.
% FIXME we need to resolve this paragraph


\subsection{Multiple-message tagging attacks} \subsection{Multiple-message tagging attacks}
\label{subsec:multi-tagging} \label{subsec:multi-tagging}
Expand Down

0 comments on commit 5e31893

Please sign in to comment.