Scrambling for lightweight censorship resistance

Joseph Bonneau, Rubin Xu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XIX - 19th International Workshop, Revised Selected Papers
Pages296-302
Number of pages7
Volume7114 LNCS
DOIs
StatePublished - 2011
Event19th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: Mar 28 2011Mar 30 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7114 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other19th International Security Protocols Workshop
CountryUnited Kingdom
CityCambridge
Period3/28/113/30/11

Fingerprint

Workload
JavaScript
Data Communication
Communication
Mobile Phone
Mobile phones
Communication Networks
Inertia
Encryption
Telecommunication networks
Cryptography
Accelerate
Inspection
Scanning
Servers
Server
Filtering
Software
Term
Resistance

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Bonneau, J., & Xu, R. (2011). Scrambling for lightweight censorship resistance. In Security Protocols XIX - 19th International Workshop, Revised Selected Papers (Vol. 7114 LNCS, pp. 296-302). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7114 LNCS). https://doi.org/10.1007/978-3-642-25867-1_28

Scrambling for lightweight censorship resistance. / Bonneau, Joseph; Xu, Rubin.

Security Protocols XIX - 19th International Workshop, Revised Selected Papers. Vol. 7114 LNCS 2011. p. 296-302 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7114 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bonneau, J & Xu, R 2011, Scrambling for lightweight censorship resistance. in Security Protocols XIX - 19th International Workshop, Revised Selected Papers. vol. 7114 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7114 LNCS, pp. 296-302, 19th International Security Protocols Workshop, Cambridge, United Kingdom, 3/28/11. https://doi.org/10.1007/978-3-642-25867-1_28
Bonneau J, Xu R. Scrambling for lightweight censorship resistance. In Security Protocols XIX - 19th International Workshop, Revised Selected Papers. Vol. 7114 LNCS. 2011. p. 296-302. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-25867-1_28
Bonneau, Joseph ; Xu, Rubin. / Scrambling for lightweight censorship resistance. Security Protocols XIX - 19th International Workshop, Revised Selected Papers. Vol. 7114 LNCS 2011. pp. 296-302 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{c881f44ff5224e3d972ae8e1481c465e,
title = "Scrambling for lightweight censorship resistance",
abstract = "In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.",
author = "Joseph Bonneau and Rubin Xu",
year = "2011",
doi = "10.1007/978-3-642-25867-1_28",
language = "English (US)",
isbn = "9783642258664",
volume = "7114 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "296--302",
booktitle = "Security Protocols XIX - 19th International Workshop, Revised Selected Papers",

}

TY - GEN

T1 - Scrambling for lightweight censorship resistance

AU - Bonneau, Joseph

AU - Xu, Rubin

PY - 2011

Y1 - 2011

N2 - In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.

AB - In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to greatly increase the workload of the censor by scrambling all data during communication, while maintaining reasonable workloads for the endpoints of the communication network. In particular, our goal is to make it impossible for the censor to effectively accelerate the de-scrambling procedure over what may be achieved by commodity PCs or mobile phones at the endpoints, a goal which we term high-inertia scrambling. We also aim to achieve this using the standard JavaScript runtime environment of modern browsers, requiring no distribution or installation of censorship-resistance software.

UR - http://www.scopus.com/inward/record.url?scp=84855789602&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84855789602&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-25867-1_28

DO - 10.1007/978-3-642-25867-1_28

M3 - Conference contribution

AN - SCOPUS:84855789602

SN - 9783642258664

VL - 7114 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 296

EP - 302

BT - Security Protocols XIX - 19th International Workshop, Revised Selected Papers

ER -