diff options
| author | Dennis Brentjes <dennis@brentj.es> | 2018-06-26 23:16:41 +0200 |
|---|---|---|
| committer | Dennis Brentjes <dennis@brentj.es> | 2018-08-18 14:12:53 +0200 |
| commit | 23968a760efa6e03e8d47fbff108ec5aae010fe3 (patch) | |
| tree | 814aa46a2a753bab7aee12ee99a95e3dd5672bf4 /content/conclusion.tex | |
| parent | d0c805d47d54c20d34795cc8bcf5b80cfa03c31e (diff) | |
| download | thesis-23968a760efa6e03e8d47fbff108ec5aae010fe3.tar.gz thesis-23968a760efa6e03e8d47fbff108ec5aae010fe3.tar.bz2 thesis-23968a760efa6e03e8d47fbff108ec5aae010fe3.zip | |
Small revision of the thesis.
Diffstat (limited to 'content/conclusion.tex')
| -rw-r--r-- | content/conclusion.tex | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/content/conclusion.tex b/content/conclusion.tex index 5718746..befeb8d 100644 --- a/content/conclusion.tex +++ b/content/conclusion.tex @@ -4,7 +4,13 @@ The big picture shows using elliptic curve for \cmix can be very beneficial. Esp So in general using elliptic curve for \cmix shows promise. However there is more research to be done. Writing optimized backends for both algorithms and rerunning the tests to see if the differences still hold, is one of them. This is one of the fundamental things that need to be checked in further research. The goal of this research was feasibility, and this research shows just that. Now somebody with knowledge of writing fast and constant time cryptography implementations can pickup the topic of writing specialized backends and retest the algorithm. -Another point to be taken into consideration is that this is the happy flow of the protocol. Checks like the tagging attack mitigation talked about in section \ref{sec:tagging} are implemented in a ``null'' fashion. Meaning the functions are in place and are being called but the implementation just returns a ``null'' byte as hash of the things it supposed to hash. Therefore the hash checking code is not in place. This was a deliberate choice, as these checks would not meaningfully affect the timings. The hashing algorithm scales linearly with the input size and would be the same over the 2 protocols. and checking it would also scale linearly with the input. Therefore it would be a constant time addition which would differ with a factor 8 between the 2 algorithms. In fact it would only pollute the timing results of the other cryptographic operations. However the protocol therefore needs some work to incorporate the hash checking where necessary. Therefore complying to the protocol standard. +Another point to be taken into consideration is that this is the happy flow of the protocol. Checks like the tagging attack mitigation talked about in section \ref{sec:tagging} are implemented in a ``null'' fashion. Meaning the functions are in place and are being called but the implementation just returns a ``null'' byte as hash of the things it supposed to hash. Therefore the hash checking code is not in place. This was a deliberate choice, as these checks would not meaningfully affect the timings. The hashing algorithm scales linearly with the input size and would be the same over the 2 protocols. and checking it would also scale linearly with the input. Therefore it would be a constant time addition. In fact it would only pollute the timing results of the other cryptographic operations. However the protocol therefore needs some work to incorporate the hash checking where necessary. Therefore complying to the protocol standard. + +Another interesting avenue to take is to simulate real network traffic. There are frameworks\cite{zhang2015survey} to this end but none of the more popular and established ones work on the application layer. And to adapt the current framework to work on a network level or to convert route network traffic over the application layer is too much work to be in scope for this research. + +And finally, there is still room to run this benchmark on separate machines. Having a server dedicated for each of the nodes and have 500 separate clients run the protocol. The benchmark framework is capable of this type of setup. All the communication is done over $TCP + SSL$ for the node communication and $TCP$ for the communication to the statistics collection daemon. But again writing additional tooling to distribute the executables and automation scripts would just take too long for the current research. + +\newpage |
