Anonymous Connections And Onion Routing

1,039 views
855 views

Published on

Published in: Technology, Health & Medicine
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,039
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
98
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Anonymous Connections And Onion Routing

  1. 1. Anonymous Connections and Onion Routing 1
  2. 2. Is Internet communication private? Anonymous Connections and Onion Routing 3
  3. 3. Types of Attacks Active Attacks Passive Attacks Anonymous Connections and Onion Routing 4
  4. 4. Active Attack Anonymous Connections and Onion Routing 5
  5. 5. Passive Attack Anonymous Connections and Onion Routing 6
  6. 6. Eavesdropping What is going on inside????? Eavesdropping is the act of secretly listening to the private conversation of others without their consent. Anonymous Connections and Onion Routing 7
  7. 7. Onion Routing Sender and the receiver nodes communicate with each other anonymously by means of some intermediate nodes called as onion routers. Anonymous Connections and Onion Routing 8
  8. 8. Network Infrastructure Anonymous Connections and Onion Routing 9
  9. 9. Proxy Interfaces Anonymous Connections and Onion Routing 10
  10. 10. Anonymous Connections and Onion Routing 11
  11. 11. Defining a route Constructing an anonymous connection and onion Moving onion through an anonymous connection Destroying the anonymous connection Anonymous Connections and Onion Routing 12
  12. 12. Anonymous Connections and Onion Routing 13
  13. 13. E4pu (3’s IP address, E3pu ((5’s IP address, (E5pu (recipient’s IP address, data))))) Anonymous Connections and Onion Routing 14
  14. 14. Anonymous Connections and Onion Routing 15
  15. 15. Anonymous Connections and Onion Routing 16
  16. 16. Anonymous Connections and Onion Routing 17
  17. 17. The size of the onion reduces as it nears the destination Every onion router has details of only its previous and next hop An attacker might compromise a router, acquires private key and decrypts data. Packet delivery is not ensured Anonymous Connections and Onion Routing 18
  18. 18. Anonymous Chatting Web Browsing Electronic Mail Remote Login Anonymous Cash 19
  19. 19. •The purpose of onion Routing is to protect the anonymity of a user who wants to communicate over a network. •Resistant to Eavesdropping. Anonymous Connections and Onion Routing 20
  20. 20. References http://www.ietf.org/rfc/rfc793.txt M. Reed, P. Syverson, D. Goldschlag, "Anonymous Connections and Onion Routing", IEEE Symposium on Security and Privacy (1997) http://tor.eff.org/tor-design.pdf http://tor.eff.org/ Anonymous Connections and Onion Routing 21
  21. 21. 22

×