Scrambling for lightweight censorship resistance

Joseph Bonneau, Rubin Xu

Research output: Chapter in Book/Report/Conference proceedingConference contribution


In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XIX - 19th International Workshop, Revised Selected Papers
Number of pages7
StatePublished - 2011
Event19th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: Mar 28 2011Mar 30 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7114 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other19th International Security Protocols Workshop
Country/TerritoryUnited Kingdom

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Scrambling for lightweight censorship resistance'. Together they form a unique fingerprint.

Cite this