@node Encless
+@cindex Encryptionless
+@cindex Encryptionless mode
+@cindex Chaffing-and-Winnowing
+@cindex AONT
+@cindex All-Or-Nothing-Transformation
+@cindex OAEP
+@cindex SAEP+
@subsection Encryptionless mode
Some jurisdictions can force user to reveal his encryption keys. However
@url{http://theory.lcs.mit.edu/~cis/pubs/rivest/fusion.ps,
All-Or-Nothing-Transformation} (based on
@url{http://cseweb.ucsd.edu/~mihir/papers/oaep.html, Optimal Asymmetric
-Encryption Padding}) on the data. It is confidentiality preserving
+Encryption Padding}) on the data. This is confidentiality preserving
encoding.
AONT is just a keyless encoding of the data. CnW uses only
signature algorithms. No encryption and steganography involved.
In this mode each outgoing packet became larger on 4128 bytes and
-@ref{Noise, noise} is forcefully enabled. So this is rather resource
-hungry mode!
+@ref{Noise, noise} is forcefully enabled. So this is resource hungry mode!
@strong{Beware}: by default packet serial numbers are still processed
through the XTEA encryption. It is not required for confidentiality and
safely can be disabled, turned off or maybe its keys even can be
revealed without security and forward secrecy loss.
-See @code{src/govpn/cnw} and @code{src/govpn/aont} packages for
-details of AONT and chaffing operations.
+See @code{govpn/cnw} and @code{govpn/aont} packages for details of AONT
+and chaffing operations.