Your SlideShare is downloading. ×
Anonymous Connections And Onion Routing
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Anonymous Connections And Onion Routing

523
views

Published on

Published in: Technology, Health & Medicine

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
523
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
54
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Anonymous Connections and Onion Routing 1
  • 2. Is Internet communication private? Anonymous Connections and Onion Routing 3
  • 3. Types of Attacks Active Attacks Passive Attacks Anonymous Connections and Onion Routing 4
  • 4. Active Attack Anonymous Connections and Onion Routing 5
  • 5. Passive Attack Anonymous Connections and Onion Routing 6
  • 6. Eavesdropping What is going on inside????? Eavesdropping is the act of secretly listening to the private conversation of others without their consent. Anonymous Connections and Onion Routing 7
  • 7. Onion Routing Sender and the receiver nodes communicate with each other anonymously by means of some intermediate nodes called as onion routers. Anonymous Connections and Onion Routing 8
  • 8. Network Infrastructure Anonymous Connections and Onion Routing 9
  • 9. Proxy Interfaces Anonymous Connections and Onion Routing 10
  • 10. Anonymous Connections and Onion Routing 11
  • 11. Defining a route Constructing an anonymous connection and onion Moving onion through an anonymous connection Destroying the anonymous connection Anonymous Connections and Onion Routing 12
  • 12. Anonymous Connections and Onion Routing 13
  • 13. E4pu (3’s IP address, E3pu ((5’s IP address, (E5pu (recipient’s IP address, data))))) Anonymous Connections and Onion Routing 14
  • 14. Anonymous Connections and Onion Routing 15
  • 15. Anonymous Connections and Onion Routing 16
  • 16. Anonymous Connections and Onion Routing 17
  • 17. The size of the onion reduces as it nears the destination Every onion router has details of only its previous and next hop An attacker might compromise a router, acquires private key and decrypts data. Packet delivery is not ensured Anonymous Connections and Onion Routing 18
  • 18. Anonymous Chatting Web Browsing Electronic Mail Remote Login Anonymous Cash 19
  • 19. •The purpose of onion Routing is to protect the anonymity of a user who wants to communicate over a network. •Resistant to Eavesdropping. Anonymous Connections and Onion Routing 20
  • 20. References http://www.ietf.org/rfc/rfc793.txt M. Reed, P. Syverson, D. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Symposium on Security and Privacy (1997) http://tor.eff.org/tor-design.pdf http://tor.eff.org/ Anonymous Connections and Onion Routing 21
  • 21. 22