Anonymous Connections And Onion Routing

Preview:

DESCRIPTION

 

Citation preview

Anonymous Connections and Onion Routing 1

Is Internet communication

private?

Anonymous Connections and Onion Routing 3

Types of AttacksTypes of Attacks

Active AttacksActive Attacks

Passive AttacksPassive Attacks

Anonymous Connections and Onion Routing

4

Anonymous Connections and Onion Routing

5

Active Attack

Anonymous Connections and Onion Routing

6

Passive Attack

EavesdroppingEavesdropping

Anonymous Connections and Onion Routing 7

Eavesdropping is the act of secretly listening to the private conversation of others without their consent.

What is going on

inside?????

Anonymous Connections and Onion Routing 8

Onion RoutingOnion Routing SSenderender and the and the receiverreceiver nodes nodes

communicatecommunicate with each other with each other anonymouslyanonymously by means of some by means of some intermediate nodesintermediate nodes called as called as onion routersonion routers..

Network Network InfrastructureInfrastructure

Anonymous Connections and Onion Routing 9

Proxy Proxy InterfacesInterfaces

Anonymous Connections and Onion Routing 10

Anonymous Connections and Onion Routing 11

Defining a routeDefining a routeConstructing an anonymous connection Constructing an anonymous connection and onionand onionMoving onion through an anonymous Moving onion through an anonymous connectionconnectionDestroying the anonymous connectionDestroying the anonymous connection

Anonymous Connections and Onion Routing 12

Anonymous Connections and Onion Routing 13

Anonymous Connections and Onion Routing 14

E4pu (3’s IP address, E3pu ((5’s IP E4pu (3’s IP address, E3pu ((5’s IP address, (E5pu (recipient’s IP address, (E5pu (recipient’s IP address, data)))))address, data)))))

Anonymous Connections and Onion Routing 15

Anonymous Connections and Onion Routing 16

Anonymous Connections and Onion Routing 17

The size of the onion reduces as it The size of the onion reduces as it nears the destinationnears the destination Every onion router has details of only Every onion router has details of only its previous and next hopits previous and next hopAn attacker might compromise a An attacker might compromise a router, acquires private key and router, acquires private key and decrypts data.decrypts data. Packet delivery is not ensuredPacket delivery is not ensured

Anonymous Connections and Onion Routing 18

19

Anonymous Chatting

Web Browsing

Anonymous Cash

Remote Login

Electronic Mail

•The purpose of onion Routing is to protect the anonymity of a user who wants to communicate over a network.

•Resistant to Eavesdropping.

Anonymous Connections and Onion Routing 20

Referenceshttp://www.ietf.org/rfc/rfc793.txtM. Reed, P. Syverson, D. Goldschlag,

"Anonymous Connections and Onion Routing", IEEE Symposium on Security and Privacy (1997)

http://tor.eff.org/tor-design.pdfhttp://tor.eff.org/

Anonymous Connections and Onion Routing 21

22

Recommended