How It Works
secure channel | insecure channel | |||||||||||||||||||||||||||||||||||||||||||||
Alice | → | Charles | → | Bob | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
constructs 4 packets, each containing one bit of her message and a valid MAC |
|
adds 4 chaff packets with inverted bits and invalid MAC, shown in italics (chaffing) |
|
discards packets with invalid MAC to recover the message (winnowing) | ||||||||||||||||||||||||||||||||||||||||||
Read more about this topic: Chaffing And Winnowing Famous quotes containing the word works:“We do not fear censorship for we have no wish to offend with improprieties or obscenities, but we do demand, as a right, the liberty to show the dark side of wrong, that we may illuminate the bright side of virtuethe same liberty that is conceded to the art of the written word, that art to which we owe the Bible and the works of Shakespeare.” |