• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Tor   the onion router
 

Tor the onion router

on

  • 4,259 views

null - Mumbai June 2012 Meet

null - Mumbai June 2012 Meet

Statistics

Views

Total Views
4,259
Views on SlideShare
3,770
Embed Views
489

Actions

Likes
2
Downloads
106
Comments
1

3 Embeds 489

http://null.co.in 461
https://twitter.com 27
https://duckduckgo.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • thanks
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Tor   the onion router Tor the onion router Presentation Transcript

    • THE ONION ROUTER DHARAMVIR BISHT
    • Who needs Anonymity• Government Organization ?• Private Organization?• Hackers• And yes !!!Criminals? But they already have it• What About YOU
    • TOR• Onion routing is an anonymous communication technique over a computer network. Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes
    • Anonymous Connection and Onion Routing
    • Who is Talking to Whom ?In a Public Network>Packet headers identify recipients>Packet routes can be tracked
    • Traffic Analysis Reveals Identities>Who is searching a public database?>Which companies are collaborating?>What are you talking to via-Email?>What do you shop online?
    • ObjectivesDesign an infrastructure that>Makes traffic analysis hard>Separates identification from routingOur goals is anonymous connections, not anonymous communication.An infrastructure, Onion Routing, has been implemented.
    • Steps for Onion Routing> Define the route>Construct the anonymous connection>Move and encrypt the data through the connection>Destroy the anonymous connection
    • Tor in brief – 1/3Step 1: Alice‘s Tor client obtains a list of Tor nodes from a directory server
    • Tor in brief – 2/3Step 2: Alice‘s Tor client picks a random path to destination Server. Green links are encrypted, red links are in the clear.
    • Tor in brief – 3/3Step 3: If the user wants access to another site, Alice‘s Tor client selects a second random path. Again, green links are encrypted, red links are in the clear.
    • ExampleLet onion routers 4, 3, and 5 be randomly selected bythe onion proxy
    • Onion Sent by Client to 4Router 4 will decrypt the E{4u} layer usingIts private key, to find the next router’s Ip address,and encrypted
    • Onion Sent by 4 to 3Router 3 will decrypt the E{3u} layer usingIts private key, to find the next router’s Ip address,and encrypted
    • Onion Sent by 3 to 5Router 5 will decrypt the E{5u} layer usingIts private key, to just find unencrypted data packet Data Sent by 5 to Target
    • TOOLS• TOR BROWSER• TOR GATEWAY• TOR WORK STATION• JANUSVM
    • References• https://www.torproject.org/about/overview.h tml.en• http://www.onion-router.net/• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/grou p10/index• http://en.wikipedia.org/wiki/Onion_routing