Anonymous Connections And Onion Routing
Upcoming SlideShare
Loading in...5
×
 

Anonymous Connections And Onion Routing

on

  • 515 views

 

Statistics

Views

Total Views
515
Views on SlideShare
515
Embed Views
0

Actions

Likes
0
Downloads
24
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Anonymous Connections And Onion Routing Anonymous Connections And Onion Routing Presentation Transcript

    • Anonymous Connections and Onion Routing 1
    • Is Internet communication private? Anonymous Connections and Onion Routing 3
    • Types of Attacks Active Attacks Passive Attacks Anonymous Connections and Onion Routing 4
    • Active Attack Anonymous Connections and Onion Routing 5
    • Passive Attack Anonymous Connections and Onion Routing 6
    • Eavesdropping What is going on inside????? Eavesdropping is the act of secretly listening to the private conversation of others without their consent. Anonymous Connections and Onion Routing 7
    • Onion Routing Sender and the receiver nodes communicate with each other anonymously by means of some intermediate nodes called as onion routers. Anonymous Connections and Onion Routing 8
    • Network Infrastructure Anonymous Connections and Onion Routing 9
    • Proxy Interfaces Anonymous Connections and Onion Routing 10
    • Anonymous Connections and Onion Routing 11
    • Defining a route Constructing an anonymous connection and onion Moving onion through an anonymous connection Destroying the anonymous connection Anonymous Connections and Onion Routing 12
    • Anonymous Connections and Onion Routing 13
    • E4pu (3’s IP address, E3pu ((5’s IP address, (E5pu (recipient’s IP address, data))))) Anonymous Connections and Onion Routing 14
    • Anonymous Connections and Onion Routing 15
    • Anonymous Connections and Onion Routing 16
    • Anonymous Connections and Onion Routing 17
    • The size of the onion reduces as it nears the destination Every onion router has details of only its previous and next hop An attacker might compromise a router, acquires private key and decrypts data. Packet delivery is not ensured Anonymous Connections and Onion Routing 18
    • Anonymous Chatting Web Browsing Electronic Mail Remote Login Anonymous Cash 19
    • •The purpose of onion Routing is to protect the anonymity of a user who wants to communicate over a network. •Resistant to Eavesdropping. Anonymous Connections and Onion Routing 20
    • References http://www.ietf.org/rfc/rfc793.txt M. Reed, P. Syverson, D. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Symposium on Security and Privacy (1997) http://tor.eff.org/tor-design.pdf http://tor.eff.org/ Anonymous Connections and Onion Routing 21
    • 22