Public-key cryptography: Difference between revisions

Content deleted Content added
No edit summary
Karger's thesis on limitations of end-to-end encryption is free to read.
Line 132:
|chapter=11: Limitations of End-to-End Encryption
|hdl=1721.1/149471
|hdl-access=free
|quote=The scenario just described would seem to be secure, because all data is encrypted before being passed to the communications processors. However, certain control information must be passed in cleartext from the host to the communications processor to allow the network to function. This control information consists of the destination address for the packet, the length of the packet, and the time between successive packet transmissions.
}}</ref><ref name="chaum1981untraceableemail">{{cite journal