How It Works
| secure channel | insecure channel | |||||||||||||||||||||||||||||||||||||||||||||
| Alice | → | Charles | → | Bob | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| constructs 4 packets, each containing one bit of her message and a valid MAC |
|
adds 4 chaff packets with inverted bits and invalid MAC, shown in italics (chaffing) |
|
discards packets with invalid MAC to recover the message (winnowing) | ||||||||||||||||||||||||||||||||||||||||||
Read more about this topic: Chaffing And Winnowing Famous quotes containing the word works:“I shall not bring an automobile with me. These inventions infest France almost as much as Bloomer cycling costumes, but they make a horrid racket, and are particularly objectionable. So are the Bloomers. Nothing more abominable has ever been invented. Perhaps the automobile tricycles may succeed better, but I abjure all these works of the devil.” | ||||||||||||||||||||||||||||||||||||||||||||||