Gabriel Belingueres wrote:
> 
> Hi,
> 
> Talking in the sci.crypt newsgroup, I did have an
> idea about how to do the Web more secure against traffic analysis. The
> idea come from a paper I been reading ("Analysis of the SSL 3.0
> protocol" by B. Schneier and D. Wagner). They describe how an attacker
> can guess the pages you have been accessed by looking the lengths of the
> SSL messages exchanged in the HTTPS's requests and replys.
> The idea I was thinking is to add a tiny protocol between HTTP and SSL,
> to break the 1-to-1 mapping between HTTP and SSL messages. The mapping
> now would be in a random way.

?? How?

> Could anybody give me your impressions about that idea?
> Should I continue further designing the protocol, or you think that
> nobody cares about web traffic analysis?

It is interesting, but I don't see how you propose to defeat it.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to