Access Restriction

Author Bernstein, Daniel J. ♦ Hamburg, Mike ♦ Krasnova, Anna ♦ Lange, Tanja
Source CiteSeerX
Content type Text
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Uniform Random String ♦ Censorship-circumvention Tool ♦ New Bijection ♦ Curve Point ♦ Elliptic Curve ♦ Unblocked Program ♦ Arm Race ♦ High-security High-speed Elliptic-curve System ♦ Traffic Pattern ♦ Reasonable Number ♦ So-phisticated Deep-packet Inspection ♦ Elliptic-curve Cryptogra-phy ♦ Elliptic-curve Point ♦ Secure Curve ♦ Odd-characteristic Elliptic Curve ♦ Simple Traffic ♦ Tool Aim ♦ User Data
Description In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so that simple traffic profiling cannot identify the tools within a reasonable number of traces; the censors respond by deploying firewalls with increasingly so-phisticated deep-packet inspection. Cryptography hides patterns in user data but does not evade censorship if the censor can recognize patterns in the cryptography itself. In particular, elliptic-curve cryptogra-phy often transmits points on known elliptic curves, and those points are easily distinguishable from uniform random strings of bits. This paper introduces high-security high-speed elliptic-curve systems in which elliptic-curve points are encoded so as to be indistinguishable from uniform random strings. At a lower level, this paper introduces a new bijection between strings and about half of all curve points; this bijection is applicable to every odd-characteristic elliptic curve with a point of order 2, except for curves of j-invariant 1728. This paper also presents guidelines to construct, and two exam-ples of, secure curves suitable for these encodings.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Learning Resource Type Article