Your SlideShare is downloading. ×
0
THE ONION ROUTER     DHARAMVIR BISHT
Who needs Anonymity•   Government Organization ?•   Private Organization?•   Hackers•   And yes !!!Criminals? But they alr...
TOR• Onion routing is an anonymous communication  technique over a computer network. Messages  are constantly encrypted an...
Anonymous Connection and     Onion Routing
Who is Talking to Whom ?In a Public Network>Packet headers identify recipients>Packet routes can be tracked
Traffic Analysis Reveals            Identities>Who is searching a public database?>Which companies are collaborating?>What...
ObjectivesDesign an infrastructure that>Makes traffic analysis hard>Separates identification from routingOur goals is anon...
Steps for Onion Routing> Define the route>Construct the anonymous connection>Move and encrypt the data through the  connec...
Tor in brief – 1/3Step 1: Alice‘s Tor client obtains a list of Tor  nodes from a directory server
Tor in brief – 2/3Step 2: Alice‘s Tor client picks a random path to  destination Server. Green links are encrypted, red  l...
Tor in brief – 3/3Step 3: If the user wants access to another site, Alice‘s  Tor client selects a second random path. Agai...
ExampleLet onion routers 4, 3, and 5 be randomly selected bythe onion proxy
Onion Sent by Client to 4Router 4 will decrypt the E{4u} layer usingIts private key, to find the next router’s Ip address,...
Onion Sent by 4 to 3Router 3 will decrypt the E{3u} layer usingIts private key, to find the next router’s Ip address,and e...
Onion Sent by 3 to 5Router 5 will decrypt the E{5u} layer usingIts private key, to just find unencrypted data packet      ...
TOOLS•   TOR BROWSER•   TOR GATEWAY•   TOR WORK STATION•   JANUSVM
References• https://www.torproject.org/about/overview.h  tml.en• http://www.onion-router.net/• http://ntrg.cs.tcd.ie/under...
Upcoming SlideShare
Loading in...5
×

Tor the onion router

4,946

Published on

null - Mumbai June 2012 Meet

Published in: Technology, Self Improvement
2 Comments
2 Likes
Statistics
Notes
  • i would like to have your number so we can discuss more about the TOR as though i am also working on this :) waiting for your reply !
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • thanks
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
4,946
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
218
Comments
2
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Tor the onion router"

  1. 1. THE ONION ROUTER DHARAMVIR BISHT
  2. 2. Who needs Anonymity• Government Organization ?• Private Organization?• Hackers• And yes !!!Criminals? But they already have it• What About YOU
  3. 3. TOR• Onion routing is an anonymous communication technique over a computer network. Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes
  4. 4. Anonymous Connection and Onion Routing
  5. 5. Who is Talking to Whom ?In a Public Network>Packet headers identify recipients>Packet routes can be tracked
  6. 6. Traffic Analysis Reveals Identities>Who is searching a public database?>Which companies are collaborating?>What are you talking to via-Email?>What do you shop online?
  7. 7. ObjectivesDesign an infrastructure that>Makes traffic analysis hard>Separates identification from routingOur goals is anonymous connections, not anonymous communication.An infrastructure, Onion Routing, has been implemented.
  8. 8. Steps for Onion Routing> Define the route>Construct the anonymous connection>Move and encrypt the data through the connection>Destroy the anonymous connection
  9. 9. Tor in brief – 1/3Step 1: Alice‘s Tor client obtains a list of Tor nodes from a directory server
  10. 10. Tor in brief – 2/3Step 2: Alice‘s Tor client picks a random path to destination Server. Green links are encrypted, red links are in the clear.
  11. 11. Tor in brief – 3/3Step 3: If the user wants access to another site, Alice‘s Tor client selects a second random path. Again, green links are encrypted, red links are in the clear.
  12. 12. ExampleLet onion routers 4, 3, and 5 be randomly selected bythe onion proxy
  13. 13. Onion Sent by Client to 4Router 4 will decrypt the E{4u} layer usingIts private key, to find the next router’s Ip address,and encrypted
  14. 14. Onion Sent by 4 to 3Router 3 will decrypt the E{3u} layer usingIts private key, to find the next router’s Ip address,and encrypted
  15. 15. Onion Sent by 3 to 5Router 5 will decrypt the E{5u} layer usingIts private key, to just find unencrypted data packet Data Sent by 5 to Target
  16. 16. TOOLS• TOR BROWSER• TOR GATEWAY• TOR WORK STATION• JANUSVM
  17. 17. References• https://www.torproject.org/about/overview.h tml.en• http://www.onion-router.net/• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/grou p10/index• http://en.wikipedia.org/wiki/Onion_routing
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×