Tor the onion router

6,783 views

Published on

null - Mumbai June 2012 Meet

Published in: Technology, Self Improvement
2 Comments
3 Likes
Statistics
Notes
  • i would like to have your number so we can discuss more about the TOR as though i am also working on this :) waiting for your reply !
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • thanks
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total views
6,783
On SlideShare
0
From Embeds
0
Number of Embeds
504
Actions
Shares
0
Downloads
333
Comments
2
Likes
3
Embeds 0
No embeds

No notes for slide

Tor the onion router

  1. 1. THE ONION ROUTER DHARAMVIR BISHT
  2. 2. Who needs Anonymity• Government Organization ?• Private Organization?• Hackers• And yes !!!Criminals? But they already have it• What About YOU
  3. 3. TOR• Onion routing is an anonymous communication technique over a computer network. Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes
  4. 4. Anonymous Connection and Onion Routing
  5. 5. Who is Talking to Whom ?In a Public Network>Packet headers identify recipients>Packet routes can be tracked
  6. 6. Traffic Analysis Reveals Identities>Who is searching a public database?>Which companies are collaborating?>What are you talking to via-Email?>What do you shop online?
  7. 7. ObjectivesDesign an infrastructure that>Makes traffic analysis hard>Separates identification from routingOur goals is anonymous connections, not anonymous communication.An infrastructure, Onion Routing, has been implemented.
  8. 8. Steps for Onion Routing> Define the route>Construct the anonymous connection>Move and encrypt the data through the connection>Destroy the anonymous connection
  9. 9. Tor in brief – 1/3Step 1: Alice‘s Tor client obtains a list of Tor nodes from a directory server
  10. 10. Tor in brief – 2/3Step 2: Alice‘s Tor client picks a random path to destination Server. Green links are encrypted, red links are in the clear.
  11. 11. Tor in brief – 3/3Step 3: If the user wants access to another site, Alice‘s Tor client selects a second random path. Again, green links are encrypted, red links are in the clear.
  12. 12. ExampleLet onion routers 4, 3, and 5 be randomly selected bythe onion proxy
  13. 13. Onion Sent by Client to 4Router 4 will decrypt the E{4u} layer usingIts private key, to find the next router’s Ip address,and encrypted
  14. 14. Onion Sent by 4 to 3Router 3 will decrypt the E{3u} layer usingIts private key, to find the next router’s Ip address,and encrypted
  15. 15. Onion Sent by 3 to 5Router 5 will decrypt the E{5u} layer usingIts private key, to just find unencrypted data packet Data Sent by 5 to Target
  16. 16. TOOLS• TOR BROWSER• TOR GATEWAY• TOR WORK STATION• JANUSVM
  17. 17. References• https://www.torproject.org/about/overview.h tml.en• http://www.onion-router.net/• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/grou p10/index• http://en.wikipedia.org/wiki/Onion_routing

×