Presentation is loading. Please wait.

Presentation is loading. Please wait.

Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the.

Similar presentations


Presentation on theme: "Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the."— Presentation transcript:

1 Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the encrypted communication and possibly sample original message (plaintext). This type of privacy is typically achieved by applying an encryption standard such as the Advanced Encryption Standard (AES) to the specific communication. Eve Alice Bob

2 Network Privacy Protect the privacy a network from an eavesdropper (Eve) who can see the signals transmitted on the network. Prevent Eve from –Figuring out who is talking to whom. –Isolating a particular communication to begin a cryptographic attack on a particular conversation –Performing traffic analysis (who is talking to whom on a regular basis, etc) Eve

3 Security Benefit of UCLA OCDMA UCLA OCDMA can provide point-to-point privacy as an added feature, but this can also be accomplished by well-known traditional techniques. UCLA OCDMA provides network privacy by preventing an eavesdropper from knowing the source of a message from its wavelength or timeslot. Network privacy enhances point-to-point privacy by providing a cryptographic obstacle to the isolation of a conversation that must be overcome before the eavesdropper can mount a cryptographic attack on the point-to-point communication.


Download ppt "Point-to-Point Privacy Protect the privacy of a point-to-point communication between Alice and Bob assuming that an eavesdropper (Eve) has access to the."

Similar presentations


Ads by Google