How It Works
secure channel | insecure channel | |||||||||||||||||||||||||||||||||||||||||||||
Alice | → | Charles | → | Bob | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
constructs 4 packets, each containing one bit of her message and a valid MAC |
|
adds 4 chaff packets with inverted bits and invalid MAC, shown in italics (chaffing) |
|
discards packets with invalid MAC to recover the message (winnowing) | ||||||||||||||||||||||||||||||||||||||||||
Read more about this topic: Chaffing And Winnowing Famous quotes containing the word works:“Reason, the prized reality, the Law, is apprehended, now and then, for a serene and profound moment, amidst the hubbub of cares and works which have no direct bearing on it;Mis then lost, for months or years, and again found, for an interval, to be lost again. If we compute it in time, we may, in fifty years, have half a dozen reasonable hours.” |