SlideShare a Scribd company logo
1 of 56
Download to read offline
Onion network architecture
http://www.ataeyan.com
By: Mahdi ataeyan
Privacy?!
Symmetric­key algorithm
Public key crypto
● An unpredictable 
(typically large and 
random) number is 
used to begin 
generation of an 
acceptable pair of keys 
suitable for use by an 
asymmetric key 
algorithm.
Alice
0110101010
1101110100
0011011010
Large
Random
Number
Key
Generation
Program
Public Private
Public key encryption
● In an asymmetric key 
encryption scheme, 
anyone can encrypt 
messages using the 
public key, but only the 
holder of the paired 
private key can decrypt. 
Security depends on the 
secrecy of the private 
key.
Hello
Alice!
Alice's
private key
Encrypt
6EB69570
08E03CE4
Hello
Alice!
Decrypt
Alice's
public key
Bob
Alice
Public key shared secret
● In the Diffie–Hellman key 
exchange scheme, each party 
generates a public/private key 
pair and distributes the 
public key. After obtaining an 
authentic copy of each other's 
public keys, Alice and Bob can 
compute a shared secret 
offline. The shared secret can 
be used, for instance, as the 
key for a symmetric cipher.
Alice's
private key
Combine
keys
Bob's
public key
751A696C
24D97009
Alice's
public key
Bob's
private key
Alice
Alice and Bob's
shared secret
Bob
Combine
keys
751A696C
24D97009
Alice and Bob's
shared secret
what's Onion routing?
● OR is a technique for anonymous 
communication over a computer network
● peeling an onion.
Why onion?
Message
Router C Key
Router B Key
Router A Key
Source
Router A
Router B
Router C
Destination
entry node
● First hop into the tor network.
exit node
● last hop before destination.
relay node
● Middle node
bridge node 
● nodes not listed in the tor directory to evade 
filtering
Steps
● The originator picks nodes from the 
directory node and chose some node.
● the chosen nodes are ordered (chain or 
circuit)
● Originator encript and send data.
picks nodes from the 
directory node
Select node
After 10 minute...
Who can see the message?
●     the sender
●     the last intermediary (the exit node)
●     the recipient
end­to­end encryption
Tor off https off
Tor off https on
Tor on https off
Tor on https on
Weaknesses
● Timing analysis
● Intersection attacks
● Predecessor attacks
● Exit node sniffing
● Dos nodes
● social engineering attacks
Who's using tor?
● Diplomatic mission
● Militaries
● Normal people
● Journalists
● Activists & Whistleblowers
Hidden service
● anonymity websites 
and servers.
● accessed through 
onion address.
● Abcdefghijklmnop.o
nion
rendezvous protocol
● computer network 
protocol.
● Enables network 
node to find each 
other.
● require at least one 
unblocked and un­
NATed servers.
advertise
● advertise existence
● randomly picks some relays
● asks them to act as „introduction points“
● send public key
● introduction points dont know service 
location (ip)
introduction points
hidden service descriptor
● the hidden service assembles a hidden 
service descriptor
●  signs descriptor with private key.
● uploads descriptor to a distributed hash 
table.
● 16 character name derived from the service's 
public key.onion
hidden service descriptor
Client rendezvous point
● client needs to know onion address.
● download the descriptor from the 
distributed hash table.
● the client knows the introduction points and 
the right public key.
● Client select and connect to rendezvous 
point and telling it a one­time secret.
Client rendezvous point
client introduce message
● the client assembles an „introduce message“ 
(encrypted to the hidden service's public key) + 
address of the rendezvous point and the one­time 
secret.
● The client sends „introduce message“ to one of the 
introduction points.
● introduction points delivered to the hidden service.
● the client and service remains anonymous. 
client introduce message
Hidden Service rendezvous 
point
● The hidden service decrypts the client's 
introduce message and finds the address of 
the rendezvous point and the one­time 
secret in it.
● The service creates a circuit to the 
rendezvous point and sends the one­time 
secret to it in a „rendezvous message“. 
Hidden Service rendezvous 
point
the last step
● the rendezvous point notifies the client 
about successful connection establishment.
● connection between client and hidden 
service consists of 6 relay.
the last step
Hidden service protocol
Xyz.onion
● SHA1 hash of the public key
● the first half of the hash is encoded to 
Base32
● the suffix „.onion“ is added.
● .onion names can only contain the digits 2­7 
and the letters a­z and are exactly 16 
characters long. 
Why automatically­generated 
service name?
facebookcorewwwi.onion
Birthday attack
● cryptographic attack
● abuse 
communication 
between two or 
more parties
●
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 10 20 30 40 50 60 70 80 90 100
Probabilityofapair
Number of people
23
Get specific .onion address
● Shallot 
● Scallion (GPU hashing)
● Eschalot (wordlist search)
test!
shallot
● https://codeload.github.com/katmagic/Shallo
t/zip/master
● ./configure && make
● ./shallot
● ./shallot ^onion
● Found matching domain after 22204717 
tries: onion6r33t2v3sq7.onion
Shallot 1.5 GHZ
● Characters
● 1
● 3
● 5
● 7
● 9
● 11
● 14
● Time to generate
● Less than 1 sec
● Less than 1 sec
● 1 min
● 7 day
● 2,5 years
● 640 years
● 2.6 milion years
Hidden services
Who's using hidden service
● Hitman network
● drugs
● Child pornography
● Hacking
● Political 
(anarchism, ...)
● Warez
Tor network hacked by FBI?
Plausible deniability
List of most popular onion 
websites
● DuckDuckGo
● The Pirate Bay
● Facebook
● Blockchain.info
● Wikileaks
● SecureDrop
Graph Relays and bridges
● http://en.wikipedia.org/wiki/Onion_routing
● http://en.wikipedia.org/wiki/Tor_%28anony
mity_network%29
● http://www.fbi.gov/news/pressrel/press­rele
ases/more­than­400­.onion­addresses­includi
ng­dozens­of­dark­market­sites­targeted­as­
part­of­global­enforcement­action­on­tor­ne
twork● https://www.torproject.org/docs/hidden­servi
ces.html.en
●
● https://www.eff.org/pages/tor­and­https
● https://metrics.torproject.org/
● http://en.wikipedia.org/wiki/Plausible_deniab
ility
● http://www.theguardian.com/technology/2014
/oct/31/facebook­anonymous­tor­users­onion
●
This work is licensed under a Creative Commons Attribution­
ShareAlike 3.0 Unported License.
It makes use of the works of Kelly Loves Whales and Nick 
Merritt

More Related Content

Similar to Onion network architecture

Hybrid cryptosystem
Hybrid cryptosystemHybrid cryptosystem
Hybrid cryptosystempkgosh
 
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxManagement of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxJAYTANWANI1
 
Network Security
Network SecurityNetwork Security
Network Securityhj43us
 
Cryptography intro
Cryptography introCryptography intro
Cryptography introismaelhaider
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryptionhey4ndr3w
 
asymmetric encryption.pptx
asymmetric encryption.pptxasymmetric encryption.pptx
asymmetric encryption.pptxab2478037
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysAbdul Manaf Vellakodath
 
HifnCrypto101
HifnCrypto101HifnCrypto101
HifnCrypto101Jim Faith
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryptionNirajKumar620142
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authenticationahmad amiruddin
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communicationsdefconmoscow
 

Similar to Onion network architecture (15)

Hybrid cryptosystem
Hybrid cryptosystemHybrid cryptosystem
Hybrid cryptosystem
 
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptxManagement of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
E-mail and Encryption
E-mail and EncryptionE-mail and Encryption
E-mail and Encryption
 
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
 
asymmetric encryption.pptx
asymmetric encryption.pptxasymmetric encryption.pptx
asymmetric encryption.pptx
 
Week12
Week12Week12
Week12
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
HifnCrypto101
HifnCrypto101HifnCrypto101
HifnCrypto101
 
cryptography and encryption and decryption
cryptography and encryption and decryptioncryptography and encryption and decryption
cryptography and encryption and decryption
 
enkripsi and authentication
enkripsi and authenticationenkripsi and authentication
enkripsi and authentication
 
5.3. Undercover communications
5.3. Undercover communications5.3. Undercover communications
5.3. Undercover communications
 

More from mahdi ataeyan

دفترکل توزیع شده
دفترکل توزیع شدهدفترکل توزیع شده
دفترکل توزیع شدهmahdi ataeyan
 
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)mahdi ataeyan
 

More from mahdi ataeyan (7)

دفترکل توزیع شده
دفترکل توزیع شدهدفترکل توزیع شده
دفترکل توزیع شده
 
Blockchanes
BlockchanesBlockchanes
Blockchanes
 
Yacy search engine
Yacy search engineYacy search engine
Yacy search engine
 
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
 
One Time Password
One Time PasswordOne Time Password
One Time Password
 
Xmpp
XmppXmpp
Xmpp
 
Bitcoin
BitcoinBitcoin
Bitcoin
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 

Onion network architecture