Analyzing the Pynchon Gate Protocol

نویسنده

  • Fred Wulff
چکیده

I analyzed the Pynchon Gate Protocol, a pseudonymous mail reply handling protocol introduced by Sassaman, Coen, and Mathewson, and in particular BitTorrent’s suitability for it’s purpose within that protocol. After an unfulfilling attempt at using PRISM, I wrote a BitTorrent simulator and used that to verify the feasibility of an attack delaying the distribution of the mail and possibly removing anonymity. I also detail an attack I found during the process of codifying the protocol for PRISM centered on spamming.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Solving the Byzantine Postman Problem

Over the last several decades, there have been numerous systems proposed which aim to preserve the anonymity of the recipient of some data. Some have involved trusted third-parties or trusted hardware; others have been constructed on top of link-layer anonymity systems or mix networks. In this paper, we examine the Pynchon Gate [34], a pseudonymous message system which takes an alternate approa...

متن کامل

Toward an Information Theoretic Secure Anonymous Communication Service The Pynchon Gate Pseudonymous Mail System

We describe the Pynchon Gate, a practical pseudonymous message retrieval system. Our design uses a simple distributed-trust private information retrieval protocol to prevent adversaries from linking recipients to their pseudonyms, even when some of the infrastructure has been compromised. This approach resists global traffic analysis significantly better than existing deployed pseudonymous emai...

متن کامل

Analyzing the Effect Adding an Active Feedback Network with an Inductive behavior to a Common-Gate Topology as a Transimpedance Amplifier for Low-Power and Wide-Band Communication Applications

  Common Gate (CG) topologies are commonly used as the first stage in Transimpedance Amplifiers (TIA), due to their low input resistance. But, this structure is not solely used as a TIA and comes with other topologies such as differential amplifiers or negative resistances and capacitances. This paper deals with analyzing the effect of adding an active feedback network to a common gate topology...

متن کامل

Effect of a Training Protocol on Gait Parameters in Men with CVA

Background: Cerebrovascular Accidents (CVA) refers to any kind of damage caused by direct or indirect damage to the brain and its related elements. About 60% of brain injury victims have a permanent disorder. The purpose of this study was to investigate the effect of a 12-week selected training protocol on men walking following brain injury. Methods: In a semi-experimental study, 30 male subje...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008