14 research outputs found
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create
globally consistent event logs and other records. We make use of this
consistency property to detect and prevent man-in-the-middle attacks in a key
exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates
an inconsistency in the world views of the two honest parties, and they can
detect it with the help of the ledger. Thus, there is no need for prior
knowledge or trusted third parties apart from the distributed ledger. To
prevent impersonation attacks, we require user interaction. It appears that, in
some applications, the required user interaction is reduced in comparison to
other user-assisted key-exchange protocols
Towards privacy-preserving network monitoring: Issues and challenges
Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monitoring applications (IDSs, antivirus, etc.) for analysis, with potential risks for the legitimate privacy rights of the customers. This paper aims to discuss the technical feasibility and the underlying research challenges of a two-tiered privacy-preserving network monitoring system, where carefully designed data protection mechanisms can coexist with suitably adapted monitoring applications
Towards Privacy-preserving network monitoring: issues and challenges
Passive network monitoring is required for the operation and maintenance of communication networks as well as to detect frauds and attacks. Typically, raw packet-level traffic traces are collected using suitable traffic probe devices and fed to monitoring applications (IDSs, antivirus, etc.) for analysis, with potential risks for the legitimate privacy rights of the customers. This paper aims to discuss the technical feasibility and the underlying research challenges of a two-tiered privacy-preserving network monitoring system, where carefully designed data protection mechanisms can coexist with suitably adapted monitoring applications
High angular resolution neutron interferometry
The currently largest perfect-crystal neutron interferometer with six beam splitters and two interference loops offers novel applications in neutron interferometry. The two additional lamellas can be used for quantitative measurements of a phase shift due to crystal diffraction in the vicinity of a Bragg condition. The arising phase, referred to as “Laue phase,” reveals an extreme angular sensitivity, which allows the detection of beam deflections of the order of 10−6 s of arc. Furthermore, a precise measurement of the Laue phase at different reflections might constitute an interesting opportunity for the extraction of fundamental quantities like the neutron–electron scattering length, gravitational short-range interactions in the sub-micron range and the Debye Waller factor. For that purpose several harmonics can be utilized at the interferometer instrument ILL-S18