14 research outputs found

    Key exchange with the help of a public ledger

    Full text link
    Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols

    Towards privacy-preserving network monitoring: Issues and challenges

    No full text
    Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monitoring applications (IDSs, antivirus, etc.) for analysis, with potential risks for the legitimate privacy rights of the customers. This paper aims to discuss the technical feasibility and the underlying research challenges of a two-tiered privacy-preserving network monitoring system, where carefully designed data protection mechanisms can coexist with suitably adapted monitoring applications

    Towards Privacy-preserving network monitoring: issues and challenges

    No full text
    Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monitoring applications (IDSs, antivirus, etc.) for analysis, with potential risks for the legitimate privacy rights of the customers. This paper aims to discuss the technical feasibility and the underlying research challenges of a two-tiered privacy-preserving network monitoring system, where carefully designed data protection mechanisms can coexist with suitably adapted monitoring applications

    High angular resolution neutron interferometry

    Get PDF
    The currently largest perfect-crystal neutron interferometer with six beam splitters and two interference loops offers novel applications in neutron interferometry. The two additional lamellas can be used for quantitative measurements of a phase shift due to crystal diffraction in the vicinity of a Bragg condition. The arising phase, referred to as “Laue phase,” reveals an extreme angular sensitivity, which allows the detection of beam deflections of the order of 10−6 s of arc. Furthermore, a precise measurement of the Laue phase at different reflections might constitute an interesting opportunity for the extraction of fundamental quantities like the neutron–electron scattering length, gravitational short-range interactions in the sub-micron range and the Debye Waller factor. For that purpose several harmonics can be utilized at the interferometer instrument ILL-S18
    corecore