--%>

What is traffic padding

Explain the term traffic padding and state its purpose?

E

Expert

Verified

Traffic padding generates the cipher text output constantly, even in absence of the plaintext. A random continuous data stream is produced. When the plaintext is available, it is encrypted and then transmitted. When the input plaintext is not present, random data are encrypted and then it is transmitted.

   Related Questions in Computer Network Security

  • Q : MAC and Hash function Illustrate the

    Illustrate the differences between the MAC and Hash function?

  • Q : Middle portion of 3DES Explain middle

    Explain middle portion of the 3DES a decryption rather than the encryption?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : Explain Kerberos Explain the term

    Explain the term Kerberos.

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : Number of keys required to communicate

    Specify the number of keys required for the two people to communicate through a cipher?

  • Q : Elements of MIME State the various

    State the various elements of MIME?

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.