How It Works
secure channel | insecure channel | |||||||||||||||||||||||||||||||||||||||||||||
Alice | → | Charles | → | Bob | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
constructs 4 packets, each containing one bit of her message and a valid MAC |
|
adds 4 chaff packets with inverted bits and invalid MAC, shown in italics (chaffing) |
|
discards packets with invalid MAC to recover the message (winnowing) | ||||||||||||||||||||||||||||||||||||||||||
Read more about this topic: Chaffing And Winnowing Famous quotes containing the word works:“They that go down to the sea in ships, that do business in great waters, these see the works of the Lord and his wonders in the deep.” |