anonymous connections and onion routing
DESCRIPTION
TRANSCRIPT
Anonymous Connections and Onion Routing 1
Is Internet communication
private?
Anonymous Connections and Onion Routing 3
Types of AttacksTypes of Attacks
Active AttacksActive Attacks
Passive AttacksPassive Attacks
Anonymous Connections and Onion Routing
4
Anonymous Connections and Onion Routing
5
Active Attack
Anonymous Connections and Onion Routing
6
Passive Attack
EavesdroppingEavesdropping
Anonymous Connections and Onion Routing 7
Eavesdropping is the act of secretly listening to the private conversation of others without their consent.
What is going on
inside?????
Anonymous Connections and Onion Routing 8
Onion RoutingOnion Routing SSenderender and the and the receiverreceiver nodes nodes
communicatecommunicate with each other with each other anonymouslyanonymously by means of some by means of some intermediate nodesintermediate nodes called as called as onion routersonion routers..
Network Network InfrastructureInfrastructure
Anonymous Connections and Onion Routing 9
Proxy Proxy InterfacesInterfaces
Anonymous Connections and Onion Routing 10
Anonymous Connections and Onion Routing 11
Defining a routeDefining a routeConstructing an anonymous connection Constructing an anonymous connection and onionand onionMoving onion through an anonymous Moving onion through an anonymous connectionconnectionDestroying the anonymous connectionDestroying the anonymous connection
Anonymous Connections and Onion Routing 12
Anonymous Connections and Onion Routing 13
Anonymous Connections and Onion Routing 14
E4pu (3’s IP address, E3pu ((5’s IP E4pu (3’s IP address, E3pu ((5’s IP address, (E5pu (recipient’s IP address, (E5pu (recipient’s IP address, data)))))address, data)))))
Anonymous Connections and Onion Routing 15
Anonymous Connections and Onion Routing 16
Anonymous Connections and Onion Routing 17
The size of the onion reduces as it The size of the onion reduces as it nears the destinationnears the destination Every onion router has details of only Every onion router has details of only its previous and next hopits previous and next hopAn attacker might compromise a An attacker might compromise a router, acquires private key and router, acquires private key and decrypts data.decrypts data. Packet delivery is not ensuredPacket delivery is not ensured
Anonymous Connections and Onion Routing 18
19
Anonymous Chatting
Web Browsing
Anonymous Cash
Remote Login
Electronic Mail
•The purpose of onion Routing is to protect the anonymity of a user who wants to communicate over a network.
•Resistant to Eavesdropping.
Anonymous Connections and Onion Routing 20
Referenceshttp://www.ietf.org/rfc/rfc793.txtM. Reed, P. Syverson, D. Goldschlag,
"Anonymous Connections and Onion Routing", IEEE Symposium on Security and Privacy (1997)
http://tor.eff.org/tor-design.pdfhttp://tor.eff.org/
Anonymous Connections and Onion Routing 21
22