Submit Search
Upload
Onion network architecture
•
8 likes
•
2,770 views
mahdi ataeyan
Follow
OR is a technique for anonymous communication over a computer network
Read less
Read more
Internet
Report
Share
Report
Share
1 of 56
Download now
Download to read offline
Recommended
Onion architecture
Onion architecture
Vidyasagar Machupalli
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
Onion Architecture with S#arp
Onion Architecture with S#arp
Gary Pedretti
Domain Driven Design Through Onion Architecture
Domain Driven Design Through Onion Architecture
BoldRadius Solutions
Onion Architecture
Onion Architecture
matthidinger
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
Crypt
Crypt
sachincrazy
Recommended
Onion architecture
Onion architecture
Vidyasagar Machupalli
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
Onion Architecture with S#arp
Onion Architecture with S#arp
Gary Pedretti
Domain Driven Design Through Onion Architecture
Domain Driven Design Through Onion Architecture
BoldRadius Solutions
Onion Architecture
Onion Architecture
matthidinger
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
Crypt
Crypt
sachincrazy
Hybrid cryptosystem
Hybrid cryptosystem
pkgosh
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
JAYTANWANI1
Diffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
Network Security
Network Security
hj43us
Cryptography intro
Cryptography intro
ismaelhaider
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
E-mail and Encryption
E-mail and Encryption
hey4ndr3w
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
asymmetric encryption.pptx
asymmetric encryption.pptx
ab2478037
Week12
Week12
s1180181
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
Abdul Manaf Vellakodath
HifnCrypto101
HifnCrypto101
Jim Faith
cryptography and encryption and decryption
cryptography and encryption and decryption
NirajKumar620142
enkripsi and authentication
enkripsi and authentication
ahmad amiruddin
5.3. Undercover communications
5.3. Undercover communications
defconmoscow
دفترکل توزیع شده
دفترکل توزیع شده
mahdi ataeyan
Blockchanes
Blockchanes
mahdi ataeyan
Yacy search engine
Yacy search engine
mahdi ataeyan
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
mahdi ataeyan
One Time Password
One Time Password
mahdi ataeyan
Xmpp
Xmpp
mahdi ataeyan
Bitcoin
Bitcoin
mahdi ataeyan
More Related Content
Similar to Onion network architecture
Hybrid cryptosystem
Hybrid cryptosystem
pkgosh
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
JAYTANWANI1
Diffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
Network Security
Network Security
hj43us
Cryptography intro
Cryptography intro
ismaelhaider
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
E-mail and Encryption
E-mail and Encryption
hey4ndr3w
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
asymmetric encryption.pptx
asymmetric encryption.pptx
ab2478037
Week12
Week12
s1180181
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
Abdul Manaf Vellakodath
HifnCrypto101
HifnCrypto101
Jim Faith
cryptography and encryption and decryption
cryptography and encryption and decryption
NirajKumar620142
enkripsi and authentication
enkripsi and authentication
ahmad amiruddin
5.3. Undercover communications
5.3. Undercover communications
defconmoscow
Similar to Onion network architecture
(15)
Hybrid cryptosystem
Hybrid cryptosystem
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
Diffie-hellman algorithm
Diffie-hellman algorithm
Network Security
Network Security
Cryptography intro
Cryptography intro
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
E-mail and Encryption
E-mail and Encryption
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
asymmetric encryption.pptx
asymmetric encryption.pptx
Week12
Week12
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
HifnCrypto101
HifnCrypto101
cryptography and encryption and decryption
cryptography and encryption and decryption
enkripsi and authentication
enkripsi and authentication
5.3. Undercover communications
5.3. Undercover communications
More from mahdi ataeyan
دفترکل توزیع شده
دفترکل توزیع شده
mahdi ataeyan
Blockchanes
Blockchanes
mahdi ataeyan
Yacy search engine
Yacy search engine
mahdi ataeyan
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
mahdi ataeyan
One Time Password
One Time Password
mahdi ataeyan
Xmpp
Xmpp
mahdi ataeyan
Bitcoin
Bitcoin
mahdi ataeyan
More from mahdi ataeyan
(7)
دفترکل توزیع شده
دفترکل توزیع شده
Blockchanes
Blockchanes
Yacy search engine
Yacy search engine
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
One Time Password
One Time Password
Xmpp
Xmpp
Bitcoin
Bitcoin
Recently uploaded
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
ishabajaj13
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
Fs
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Sonam Pathan
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
furqan222004
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
vipmodelshub1
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
miss dipika
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
divyansh0kumar0
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Lucknow
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
LinaWolf1
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
divyansh0kumar0
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
Git and Github workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
gdsc13
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
Fs
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
zdzoqco
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Sonam Pathan
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Dana Luther
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Recently uploaded
(20)
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Git and Github workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
Onion network architecture
1.
Onion network architecture http://www.ataeyan.com By: Mahdi ataeyan
2.
Privacy?!
3.
Symmetrickey algorithm
4.
Public key crypto ● An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. Alice 0110101010 1101110100 0011011010 Large Random Number Key Generation Program Public Private
5.
Public key encryption ● In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. Hello Alice! Alice's private key Encrypt 6EB69570 08E03CE4 Hello Alice! Decrypt Alice's public
key Bob Alice
6.
Public key shared secret ● In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher. Alice's private key Combine keys Bob's public
key 751A696C 24D97009 Alice's public key Bob's private key Alice Alice and Bob's shared secret Bob Combine keys 751A696C 24D97009 Alice and Bob's shared secret
7.
what's Onion routing? ● OR is a technique for anonymous communication over a computer network ● peeling an onion.
8.
Why onion? Message Router C Key Router
B Key Router A Key Source Router A Router B Router C Destination
9.
entry node ● First hop into the tor network.
10.
exit node ● last hop before destination.
11.
relay node ● Middle node
12.
bridge node ● nodes not listed in the tor directory to evade filtering
13.
Steps ● The originator picks nodes from the directory node and chose some node. ● the chosen nodes are ordered (chain or circuit) ●
Originator encript and send data.
14.
picks nodes from the directory node
15.
Select node
16.
After 10 minute...
17.
Who can see the message? ● the sender ● the last intermediary (the exit node) ●
the recipient
18.
endtoend encryption
19.
Tor off https off
20.
Tor off https on
21.
Tor on https off
22.
Tor on https on
23.
Weaknesses ● Timing analysis ● Intersection attacks ●
Predecessor attacks ● Exit node sniffing ● Dos nodes ● social engineering attacks
24.
Who's using tor? ● Diplomatic mission ● Militaries ●
Normal people ● Journalists ● Activists & Whistleblowers
25.
Hidden service ● anonymity websites and servers. ● accessed through onion address. ●
Abcdefghijklmnop.o nion
26.
rendezvous protocol ● computer network protocol. ● Enables network node to find each other. ●
require at least one unblocked and un NATed servers.
27.
advertise ● advertise existence ● randomly picks some relays ●
asks them to act as „introduction points“ ● send public key ● introduction points dont know service location (ip)
28.
introduction points
29.
hidden service descriptor ● the hidden service assembles a hidden service descriptor ● signs descriptor with private key. ●
uploads descriptor to a distributed hash table. ● 16 character name derived from the service's public key.onion
30.
hidden service descriptor
31.
Client rendezvous point ● client needs to know onion address. ● download the descriptor from the distributed hash table. ●
the client knows the introduction points and the right public key. ● Client select and connect to rendezvous point and telling it a onetime secret.
32.
Client rendezvous point
33.
client introduce message ● the client assembles an „introduce message“ (encrypted to the hidden service's public key) + address of the rendezvous point and the onetime secret. ● The client sends „introduce message“ to one of the introduction points. ●
introduction points delivered to the hidden service. ● the client and service remains anonymous.
34.
client introduce message
35.
Hidden Service rendezvous point ● The hidden service decrypts the client's introduce message and finds the address of the rendezvous point and the onetime secret in it. ● The service creates a circuit to the rendezvous point and sends the onetime secret to it in a „rendezvous message“.
36.
Hidden Service rendezvous point
37.
the last step ● the rendezvous point notifies the client about successful connection establishment. ● connection between client and hidden service consists of 6 relay.
38.
the last step
39.
Hidden service protocol
40.
Xyz.onion ● SHA1 hash of the public key ● the first half of the hash is encoded to Base32 ●
the suffix „.onion“ is added. ● .onion names can only contain the digits 27 and the letters az and are exactly 16 characters long.
41.
Why automaticallygenerated service name?
42.
facebookcorewwwi.onion
43.
Birthday attack ● cryptographic attack ● abuse communication between two or more parties ● 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0
10 20 30 40 50 60 70 80 90 100 Probabilityofapair Number of people 23
44.
Get specific .onion address ● Shallot ● Scallion (GPU hashing) ●
Eschalot (wordlist search)
45.
test!
46.
shallot ● https://codeload.github.com/katmagic/Shallo t/zip/master ● ./configure && make ●
./shallot ● ./shallot ^onion ● Found matching domain after 22204717 tries: onion6r33t2v3sq7.onion
47.
Shallot 1.5 GHZ ● Characters ● 1 ●
3 ● 5 ● 7 ● 9 ● 11 ● 14 ● Time to generate ● Less than 1 sec ● Less than 1 sec ● 1 min ● 7 day ● 2,5 years ● 640 years ● 2.6 milion years
48.
Hidden services
49.
Who's using hidden service ● Hitman network ● drugs ●
Child pornography ● Hacking ● Political (anarchism, ...) ● Warez
50.
Tor network hacked by FBI?
51.
Plausible deniability
52.
List of most popular onion websites ● DuckDuckGo ● The Pirate Bay ●
Facebook ● Blockchain.info ● Wikileaks ● SecureDrop
53.
Graph Relays and bridges
54.
● http://en.wikipedia.org/wiki/Onion_routing ● http://en.wikipedia.org/wiki/Tor_%28anony mity_network%29 ●
http://www.fbi.gov/news/pressrel/pressrele ases/morethan400.onionaddressesincludi ngdozensofdarkmarketsitestargetedas partofglobalenforcementactionontorne twork● https://www.torproject.org/docs/hiddenservi ces.html.en ●
55.
● https://www.eff.org/pages/torandhttps ● https://metrics.torproject.org/ ●
http://en.wikipedia.org/wiki/Plausible_deniab ility ● http://www.theguardian.com/technology/2014 /oct/31/facebookanonymoustorusersonion ●
56.
This work is licensed under a Creative Commons Attribution ShareAlike 3.0 Unported License. It makes use of the works of Kelly Loves Whales and Nick Merritt
Download now