Elligator: Elliptic-Curve Points Indistinguishable from Uniform Random Strings

Download Now
Provided by: Association for Computing Machinery
Topic: Security
Format: PDF
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic pro ling cannot identify the tools within a reasonable number of traces; the censors respond by deploying firewalls with increasingly sophisticated deep-packet inspection. Cryptography hides patterns in user data but does not evade censorship if the censor can recognize patterns in the cryptography itself.
Download Now

Find By Topic