Yodel: Strong metadata security for voice calls

David Lazar, Yossi Gilad, Nickolai Zeldovich

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Scopus citations

Abstract

Yodel is the first system for voice calls that hides metadata (e.g., who is communicating with whom) from a powerful adversary that controls the network and compromises servers. Voice calls require sub-second message latency, but low latency has been difficult to achieve in prior work where processing each message requires an expensive public key operation at each hop in the network. Yodel avoids this expense with the idea of self-healing circuits, reusable paths through a mix network that use only fast symmetric cryptography. Once created, these circuits are resilient to passive and active attacks from global adversaries. Creating and connecting to these circuits without leaking metadata is another challenge that Yodel addresses with the idea of guarded circuit exchange, where each user creates a backup circuit in case an attacker tampers with their traffic. We evaluate Yodel across the internet and it achieves acceptable voice quality with 990 ms of latency for 5 million simulated users.

Original languageAmerican English
Title of host publicationSOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles
PublisherAssociation for Computing Machinery, Inc
Pages211-224
Number of pages14
ISBN (Electronic)9781450368735
DOIs
StatePublished - 27 Oct 2019
Event27th ACM Symposium on Operating Systems Principles, SOSP 2019 - Huntsville, Canada
Duration: 27 Oct 201930 Oct 2019

Publication series

NameSOSP 2019 - Proceedings of the 27th ACM Symposium on Operating Systems Principles

Conference

Conference27th ACM Symposium on Operating Systems Principles, SOSP 2019
Country/TerritoryCanada
CityHuntsville
Period27/10/1930/10/19

Bibliographical note

Publisher Copyright:
© 2019 David Lazar, Yossi Gilad, Nickolai Zeldovich.

Fingerprint

Dive into the research topics of 'Yodel: Strong metadata security for voice calls'. Together they form a unique fingerprint.

Cite this