Hi Malli,
You can do a search on Google/scholar for “traffic capturing attacks on the Internet”, and it’s prevention, there are implications of public attack information, hence, you are best doing your own research, however, the best example maybe radar jamming and other stealth techniques.
There are high tech methods like impedance drops on copper, intensity shields on fiber cables and various other techniques. Also , Quantum techniques have inherent prevention.
Also, you can read up split channel transfers on wireless links.
Hope you find this helpful.
Thx.,
Tushar
John Mattsson <john.m...@ericsson.com>: Jul 19 09:38AM
Hi Malli,
Harvest now, decrypt later attacks are not new. Governments have long engaged in this practice for both wireless and wired communications deemed potentially valuable for future analysis.
...more
|
Maxime Bros <maxim...@nist.gov>: Jul 18 07:19AM -0700
Dear Community,
I hope you're all doing well.
I'm thrilled to finally announce that the videos of the NIST PQC Seminars
#11 to #16 are now available online! 🎉🥳🎊
...more
|
You received this digest because you're subscribed to updates for this group. You can change your settings on the group membership page.
To unsubscribe from this group and stop receiving emails from it send an email to pqc-forum+...@list.nist.gov.
|