Scrambling for lightweight censorship resistance

Joseph Bonneau, Rubin Xu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XIX - 19th International Workshop, Revised Selected Papers
Pages296-302
Number of pages7
DOIs
StatePublished - 2011
Event19th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: Mar 28 2011Mar 30 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7114 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other19th International Security Protocols Workshop
CountryUnited Kingdom
CityCambridge
Period3/28/113/30/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Scrambling for lightweight censorship resistance'. Together they form a unique fingerprint.

Cite this