Next Issue
Volume 8, September
Previous Issue
Volume 8, March
 
 

Cryptography, Volume 8, Issue 2 (June 2024) – 15 articles

Cover Story (view full-size image): The use of encryption on data packets provides data privacy protection against direct inspection. However, it is still possible for an attacker to successfully employ side-channel attacks instead, including the use of packet size distribution, or inter-packet arrival times, i.e., examining traffic characteristics to attack user privacy, even for encrypted traffic. We demonstrate that multipath transmission can prevent analysis through known and unknown side-channels, avoiding the overheads associated with other defences. We present a thorough analysis to demonstrate that the use of four or more paths disrupts bigram (two-sequence) patterns that can be used in Hidden Markov Models (HMMs), which are commonly used for side-channel attacks on encrypted traffic. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Previous Issue
Next Issue
Back to TopTop