17 Dec
2003
17 Dec
'03
11:17 p.m.
The LEAF has many very interesting attributes. As I mentioned earlier, in response to Mike's original question -- yes, there are tremendous advantages to the LEAF for a traffic analyst. But the LEAF itself is encrypted, including the session key, so enemies can't do traffic analysis based on the LEAF. The structure of the LEAF is also a dead giveaway that Clipper is being used -- it's easy to envision a box that has the family key, and tries every LEAF-sized field to see if it decrypts to something that looks right, and in particular has the right checksum. It detects Clipper -- and coupled with a random sequence detector, it detects encrypted, non-Clipper traffic...
8179
Age (days ago)
8179
Last active (days ago)
1 comments
2 participants
participants (2)
-
Mike Godwin -
smb@research.att.com