How It Works
| secure channel | insecure channel | |||||||||||||||||||||||||||||||||||||||||||||
| Alice | → | Charles | → | Bob | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| constructs 4 packets, each containing one bit of her message and a valid MAC |
|
adds 4 chaff packets with inverted bits and invalid MAC, shown in italics (chaffing) |
|
discards packets with invalid MAC to recover the message (winnowing) | ||||||||||||||||||||||||||||||||||||||||||
Read more about this topic: Chaffing And Winnowing Famous quotes containing the word works:“Through the din and desultoriness of noon, even in the most Oriental city, is seen the fresh and primitive and savage nature, in which Scythians and Ethiopians and Indians dwell. What is echo, what are light and shade, day and night, ocean and stars, earthquake and eclipse, there? The works of man are everywhere swallowed up in the immensity of nature. The AEgean Sea is but Lake Huron still to the Indian.” | ||||||||||||||||||||||||||||||||||||||||||||||