SlideShare a Scribd company logo
1 of 41
Development of Anonymous
Networks Based on
Symmetric Key Encryptions
Presented By : MD. Hasibur Rashid // MSc. In CSE, KUET,
Bangladesh
Roll: 1407553
• Anonymous networks enable entities to send messages
without disclosing their identities. Many anonymous
networks had been proposed already, such as Mixnet,
DC-net, Crowds, etc., however, they still have serious
drawbacks. Namely, they require tremendous
computation overheads to transmit messages over
networks. That is because asymmetric key encryption
algorithms are used.
• For example, a company may acquire highly confidential
information about its rival companies from identities of
their
customers and suppliers. Therefore, the importance of
anonymous communication is increasing as more people
are being involved in network based communication.
• Anonymous networks are ones that enable message
senders to send their messages without disclosing their
identities, and various anonymous networks had been
proposed already, Mix net, DC-net , Crowds, etc., to
protect secrets of entities that communicate through
networks.
• To protect privacy
• Avoid tracking by advertising companies
• Viewing sensitive content
• Information on medical conditions
• Advice on bankruptcy
• Protection from prosecution
• Not every country guarantees free speech
• Downloading copyrighted material
• To prevent chilling-effects
• It’s easier to voice unpopular or controversial opinions if you are
anonymous
• “If you’re not doing anything wrong, you shouldn’t have
anything to hide.”
• Implies that anonymous communication is for criminals
• The truth: who uses ?
• Journalists
• Law enforcement
• Human rights activists
• Normal people
 Business executives
 Military/intelligence
personnel
 Abuse victims
1. no one except senders of messages can know identities
of the senders
2. message senders can confirm their message arrivals at
their receivers without disclosing their identities
3. receivers can send reply messages back to the senders
without knowing the senders’ identities
4. anonymous networks must be able to protect
themselves from accesses from unauthorized entities
5. anonymous networks must maintain their performances
as same as usual ones.
• Symmetric algorithms
• Conventional algorithms
• Encryption and decryption keys are the same
• Examples: DES, 3DES, AES, Blowfish
• Asymmetric algorithms
• Commonly known as Public Key algorithms
• Encryption key and decryption key are different
• Examples: Diffie-Hellman, RSA, Elliptic curve
7
• Let’s say we have a plaintext message M
• … a symmetric encryption algorithm E
• … and a key K
M  E(K, M) = C  E(K, C) = M
• Advantages:
• Fast and easy to use
• Disadvantages
• How to securely communicate the key?
8
Cyphertext C
Symmetric encryption
is reversible
• A different approach to anonymity than Crowds
• Originally designed for anonymous email
• David Chaum, 1981
• Concept has since been generalized for TCP traffic
• Hugely influential ideas
• Onion routing
• Traffic mixing
• Dummy traffic (a.k.a. cover traffic)
Drawbacks
• RSA or ElGamal, and does not work efficiently in large scale
systems where number of senders send large volume of
messages.
• A lot of computation overheads are needed to encrypt and decrypt
messages.
• Mixes form a cascade of anonymous proxies
• All traffic is protected with layers of encryption
10
Mix
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>
<KP, KS>[KP , KP , KP]
Encrypted
Tunnels
Non-encrypted
data
E(KP , E(KP , E(KP , M))) = C
11
<KP, KS> <KP, KS> <KP, KS>
12
• Links between users use public key crypto
• Users may appear on the path multiple
times
Final Destination
• No source anonymity
• Target receives m incoming messages (m may = 0)
• Target sends m + 1 outgoing messages
• Thus, the target is sending something
• Destination anonymity is maintained
• If the source isn’t sending directly to the receiver
• Source and destination are anonymous
• Source and destination are jondo proxies
• Destination is hidden by encryption
15
• The good:
• Crowds has excellent scalability
• Each user helps forward messages and handle load
• More users = better anonymity for everyone
• Strong source anonymity guarantees
• The bad:
• Very weak destination anonymity
• Evil jondos can always see the destination
• Weak unlink ability guarantees
• Basic design: a mix network with improvements
• Perfect forward secrecy
• Introduces guards to improve source anonymity
• Takes bandwidth into account when selecting relays: Mixes in Tor
are called relays
• Introduces hidden services: Servers that are only accessible via
the Tor overlay
• Largest, most well deployed anonymity preserving
service on the Internet
• Publicly available since 2002
• Continues to be developed and improved
• Currently, ~5000 Tor relays around the world
• All relays are run by volunteers
• It is suspected that some are controlled by intelligence agencies
• 500K – 900K daily users
• Numbers are likely larger now, thanks to Snowden
17
• Drawbacks
it is vulnerable to timing attacks
Same drawbacks with mixnet
Entry/
Guard
Middle Exit
Source: known
Dest: unknown
Source: unknown
Dest: unknown
Source: unknown
Dest: known
Source: known
Dest: known
• ESEBM (Enhanced Symmetric Key Encryption based Mix
net) is proposed that removes drawbacks of existing
anonymous networks by using symmetric key encryption
functions.
• ESEBM consists of two parts, they are the CP generator
(offline) and the anonymous channel (online) each of
which is configured as a sequence of servers
• senders obtain secret keys of individual servers in the
anonymous channel for encrypting their messages from
the CP generator as off-line processes.
• ESEBM can be considered as a kind of decryption type
Mixnet, in which asymmetric key encryption functions are
replaced by symmetric ones
• ESEBM consists of 2 parts, i.e. the anonymous channel
and the concealing pattern generator(CP generator).
• The anonymous channel is configured as a sequence of
N servers as same as Mixnet, and the CP generator
consists of Z-groups, where the g-th group is configured
by Ng servers,
S= sender,
Ms = Long message (Is
divided into multiple
frame),
Lm = Fame message
length, server Tj that had
generated xj(h) = CP
constructor
Qj (h)= Tag constructor
CP, X(h) = x1(h)⊕x2(h)---
⊕xN(h)
encrypting it to MS⊕X(h)
tags vector Q(h) = {Q1(h),
Q2(h), ---, QN(h)}
• each server Tj in the CP generator generates its h-th CP constructor xj(h),
and the h-th concealing pattern X(h) is constructed as XOR of them, i.e. X(h)
= x1(h)⊕x2(h)---⊕xN(h). Then, S sends MS to the first server T1 in the
anonymous channel while encrypting it to MS⊕X(h).
• each server in the anonymous channel stores its receiving messages until it
receives the predefined number of messages, and decrypts, shuffles and
forwards them to its neighboring server untie reach final destination.
• usual Mixnet where all senders encrypt their messages by using the same
single public encryption key of each mixserver, in ESEBM, senders encrypt
different messages by using different CPs
• Therefore to enable Tj to identify its CP constructor xj(h) that constitutes X(h)
for encrypting MS, The message part maintains encrypted message MS, i.e.
MS ⊕ X(h), and the tag part maintains a sequence of tags vector Q(h) =
{Q1(h), Q2(h), ---, QN(h)}
• CP generator generates 2 kinds of secret encryption keys shared between
senders and individual servers, the one is CPs and the other is tag vectors
(TVs). The CP generator is a set of server groups, each of which consists of
at least 3 servers that generate their secret CP constructors and TV
constructors
CP generator generates 2 kinds of secret encryption
keys shared between senders and individual servers,
the one is CPs and the other is tag vectors (TVs). The
CP generator is a set of server groups, each of which
consists of at least 3 servers that generate their secret
CP constructors and TV constructors independently of
others to construct CPs and TVs jointly with other
servers.
• firstly, sender S sends a set of its secret private vectors
(PVs) {P1(h), P2(h), ---, PN1(h)} as a request for a CP to
servers T1*, T2*, ---, TN1*, respectively, as shown in Fig.
3 (a). Here, each Pj(h) is vector {pj0(h), pj1(h), ---pjN(h)}
and except pj0(h), pjk(h) is a bit pattern of the same
length as element qjk(h) in TV constructor qj(h). Bit
pattern pj0(h) has the same length as CP constructor
xj(h).
• Then, X(1, h) and Q(1, h), the h-th CP and TV that the 1st
group generates, are constructed by 1st server T1*as
X(1, h) = p10(h) ⊕ x1*(h)
Q(1, h) = {p11(h), p12(h), ---,p11*(h) ⊕ ID1*(x1*(h),
q1*(h)), p1(1*+1)(h) ⊕ q1*(1*+1)(h),p1(1*+2)(h) ⊕
q1*(1*+2)(h), ---, p1N(h) ⊕ q1*N(h)}
• X(1, h) and Q(1, h) are then forwarded to T2*. However,
to protect them from eavesdropping, they are encrypted
by the secret key k1* that is shared between T1* and T2*
• TNr# in the r-th group generates group blinding vector
B(h) = {B1(h), B2(h), ---, BNr(h)}
• Then, T1(N1) sends X(h) and Q(h) = {Q1(h), Q2(h), ---,
QN(h)} to sender S, and S removes private vectors PVs
from X(h) and Q(h) by XORing them by PVs. As the
result, finally CP and TV values become as (12) and (13).
• S also attaches tag vector Q(h) = {Q1(h), Q2(h),---, QN(h)}
corresponding to X(h), to the message, and sends
{MS = x1(h)x2(h) ⊕ --- ⊕ xN(h) ⊕ MS, Q1(h), Q2(h),---,
QN(h)}
to the 1st server T1 in the anonymous channel. Here,
Q1(h) has the form ID1(x1(h), q1(h)).
• MS and Qj(h) become MS =x1(h) ⊕(x1(h) ⊕ x2(h) ⊕ --- ⊕
xN(h) ⊕ MS) = x2(h) ⊕ x3(h) ⊕ --- ⊕ xN(h) ⊕ MS
• Qj(h) =q1j(h) ⊕(q1j(h) ⊕ q2j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕
IDj(xj(h), qj(h))) = q2j(h) ⊕ q3j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕
IDj(xj(h), qj(h)).
• After that, T1 removes Q1(h) from the tag part, waits for
the predefined number of message arrivals, and shuffles
them to forward each result to server T2.
1. Sender S can receive reply messages as follows.
Firstly, S obtains 2 CP and TV pairs {X(h1), Q(h1)},
{X(h2), Q(h2)}, and constructs its message while
attaching tag vector Q(h2) and its encrypted address
2. S constructs MS║Q(h2)║(XU(h2)⊕AS), concatenation
of MS, Q(h2), and XU(h2)⊕AS. Where bit strings
XU(h2) and XL(h2) are upper and lower parts of bit
string X(h2), in other words, X(h2) = XU(h2)║XL(h2).
RepliesToAnonymousSenders
RepliesToAnonymousSenders
• reply mechanism, senders can confirm the deliveries of
their messages.
• message travelling times increase when durations
required or obtaining CPs are counted.
• Among various threats to networks, DOS attacks in which
meaningless or spam messages are sent to decrease
availabilities of networks
• The CP generator in ESEBM reduces the occurrence of
DOS attacks substantially and makes forged (modified)
messages detectable.
• ESEBM disables entities to carry out traffic analysis
attacks and replay attacks.
• multiple PCs that worked as relay servers. Where individual PCs were
equipped with 1.6GHz CPUs and 1GB of RAM and they were connected by
100Mbits/sec Ethernet.
• Fig. 6 while ESEBM needs less than 6 seconds to transfer a 20Mbits
message, Mixnet needs more than 3 minutes to transfer the same message.
• Fig. 7 shows the volume of messages that usual non-anonymous networks,
ESEBM and Mixnet can send within 1 second. These results show that,
although the throughput of ESEBM is 1/4.4 of that of non-anonymous
networks, it is more than 36 times higher than that of Mixnet. According to
statistics , e-mail message size is 59KB on average, therefore, even in the
environments used for evaluations, ESEBM can handle 7 clients at a time
that send usual e-mail messages while the non-anonymous network can
handle 33 clients at a time.
• On the other hand, Mixnet can handle only 0.2 clients.
• The capacity of ESEBM is more than 36 times higher
than that of decryption type Mix net.
• the CP generator configuration disables unauthorized
entities to send messages because only authorized
entities that had obtained secret keys from the CP
generator can send messages.
• ESEBM is secure against various kinds of attacks
including DOS attacks and message forgeries (or
modifications) that are difficult to prevent in existing
anonymous networks.
• symmetric key encryption functions also enable message
receivers to send reply messages to the anonymous
senders.
• ESEBM can be used for large scale networks, in which
number of clients exchange usual sizes of messages at less
extra costs.
• available, volume of messages can be processed almost in
parallel. message processing time of each server in ESEBM, it
consists of shuffling (31%), message decryption (26%), and
others (43%). On the other hand, message processing time of
each server in Mixnet consists of shuffling (0.8%), message
decryption (98.6%), and others (0.6%).
• Different from Mixnet in which message decryptions require
123 times of message shuffling time, in ESEBM, message
decryptions require less than 0.84 times of the shuffling time.
• ESEBM where messages are encrypted by their senders, in
SEBM, they are encrypted by a sequence of encryption
servers.
• Enhanced symmetric key encryption based Mixnet has been
proposed that removes the drawbacks of many existing
anonymous networks such as Mixnet, DC-net, etc. It satisfies
all the requirements of anonymous networks.
• As a drawback of ESEBM, a sender must acquire a concealing
pattern from the CP generator in advance to send its every
message as an offline process.
• CP generator (off-line) and the anonymous channel (on-line)
parts, every time-consuming task is removed from the
anonymous channel part and highly efficient communication
becomes possible.
• When senders or receivers claim that some server is
dishonest, ESEBM must prove all servers are honest or detect
dishonest servers if exist. Also, ESEBM must continue its
operations even some of servers are out of their services.
MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh

More Related Content

What's hot

Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsaMazin Alwaaly
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functionsDr.Florence Dayana
 
Cryptography and RSA algorithm
Cryptography and RSA algorithmCryptography and RSA algorithm
Cryptography and RSA algorithmSaifil Momin
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryptionrajakhurram
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829ajsk1950
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3koolkampus
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 

What's hot (20)

Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
Cryptography and RSA algorithm
Cryptography and RSA algorithmCryptography and RSA algorithm
Cryptography and RSA algorithm
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
Lecture 3b public key_encryption
Lecture 3b public key_encryptionLecture 3b public key_encryption
Lecture 3b public key_encryption
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Cupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829aCupdf.com public key-cryptography-569692953829a
Cupdf.com public key-cryptography-569692953829a
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
Is case study
Is   case studyIs   case study
Is case study
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 

Viewers also liked

Know Your Community - Know Your World Congo lomenie
Know Your Community - Know Your World Congo lomenieKnow Your Community - Know Your World Congo lomenie
Know Your Community - Know Your World Congo lomenieShannon Anicas
 
Know Your Community - Know Your World Mexico juan
Know Your Community - Know Your World Mexico juanKnow Your Community - Know Your World Mexico juan
Know Your Community - Know Your World Mexico juanShannon Anicas
 
Trintob.(ramjit.2012.01.13
Trintob.(ramjit.2012.01.13Trintob.(ramjit.2012.01.13
Trintob.(ramjit.2012.01.13Shannon Anicas
 
Substance Related Disorders
Substance Related DisordersSubstance Related Disorders
Substance Related DisordersAleem Ashraf
 
Screen sharing powerpoint
Screen sharing powerpointScreen sharing powerpoint
Screen sharing powerpointKhadija Ali
 
Experimental Ablation
Experimental AblationExperimental Ablation
Experimental AblationAleem Ashraf
 
Know Your Community - Know Your World Trinidad tobago-ramjt
Know Your Community - Know Your World Trinidad tobago-ramjtKnow Your Community - Know Your World Trinidad tobago-ramjt
Know Your Community - Know Your World Trinidad tobago-ramjtShannon Anicas
 
Crime & Mental Disorders
Crime & Mental DisordersCrime & Mental Disorders
Crime & Mental DisordersAleem Ashraf
 
Experimental Research
Experimental ResearchExperimental Research
Experimental ResearchAleem Ashraf
 

Viewers also liked (13)

Pb32x
Pb32xPb32x
Pb32x
 
My hot electronics
My hot electronics My hot electronics
My hot electronics
 
Know Your Community - Know Your World Congo lomenie
Know Your Community - Know Your World Congo lomenieKnow Your Community - Know Your World Congo lomenie
Know Your Community - Know Your World Congo lomenie
 
Burma copy
Burma copyBurma copy
Burma copy
 
China
China China
China
 
Know Your Community - Know Your World Mexico juan
Know Your Community - Know Your World Mexico juanKnow Your Community - Know Your World Mexico juan
Know Your Community - Know Your World Mexico juan
 
Trintob.(ramjit.2012.01.13
Trintob.(ramjit.2012.01.13Trintob.(ramjit.2012.01.13
Trintob.(ramjit.2012.01.13
 
Substance Related Disorders
Substance Related DisordersSubstance Related Disorders
Substance Related Disorders
 
Screen sharing powerpoint
Screen sharing powerpointScreen sharing powerpoint
Screen sharing powerpoint
 
Experimental Ablation
Experimental AblationExperimental Ablation
Experimental Ablation
 
Know Your Community - Know Your World Trinidad tobago-ramjt
Know Your Community - Know Your World Trinidad tobago-ramjtKnow Your Community - Know Your World Trinidad tobago-ramjt
Know Your Community - Know Your World Trinidad tobago-ramjt
 
Crime & Mental Disorders
Crime & Mental DisordersCrime & Mental Disorders
Crime & Mental Disorders
 
Experimental Research
Experimental ResearchExperimental Research
Experimental Research
 

Similar to Development of anonymous networks based on cryptography

Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptxSurendraBasnet6
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Praveen Joshi
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat systemJagsir Singh
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing finalSantanu Das Saan
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxVishwanathMahalle
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptxStudyvAbhi
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptxams1ams11
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmacanuragjagetiya
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 

Similar to Development of anonymous networks based on cryptography (20)

Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
Network security
Network securityNetwork security
Network security
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptxUnit-III_3R-CRYPTO_2021-22_VSM.pptx
Unit-III_3R-CRYPTO_2021-22_VSM.pptx
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
OS ppt Modified.pptx
OS ppt Modified.pptxOS ppt Modified.pptx
OS ppt Modified.pptx
 
Net
NetNet
Net
 
Network security
Network securityNetwork security
Network security
 
CH02-CompSec4e.pptx
CH02-CompSec4e.pptxCH02-CompSec4e.pptx
CH02-CompSec4e.pptx
 
Distribution of public keys and hmac
Distribution of public keys and hmacDistribution of public keys and hmac
Distribution of public keys and hmac
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Using RSA Algorithm in Web Services
Using RSA Algorithm in Web ServicesUsing RSA Algorithm in Web Services
Using RSA Algorithm in Web Services
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 

More from Md. Hasibur Rashid

Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Md. Hasibur Rashid
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approachMd. Hasibur Rashid
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedMd. Hasibur Rashid
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approachMd. Hasibur Rashid
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 

More from Md. Hasibur Rashid (10)

Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications Cluster based mac in vane ts for safety applications
Cluster based mac in vane ts for safety applications
 
Crane control
Crane controlCrane control
Crane control
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
 
Resisting skew accumulation
Resisting skew accumulationResisting skew accumulation
Resisting skew accumulation
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
Cloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree comparedCloud computing and grid computing 360 degree compared
Cloud computing and grid computing 360 degree compared
 
Detecting soft errors by a purely software approach
Detecting soft errors by a purely software approachDetecting soft errors by a purely software approach
Detecting soft errors by a purely software approach
 
Crane control
Crane controlCrane control
Crane control
 
Renewable energy
Renewable energyRenewable energy
Renewable energy
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Development of anonymous networks based on cryptography

  • 1. Development of Anonymous Networks Based on Symmetric Key Encryptions Presented By : MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh Roll: 1407553
  • 2. • Anonymous networks enable entities to send messages without disclosing their identities. Many anonymous networks had been proposed already, such as Mixnet, DC-net, Crowds, etc., however, they still have serious drawbacks. Namely, they require tremendous computation overheads to transmit messages over networks. That is because asymmetric key encryption algorithms are used.
  • 3. • For example, a company may acquire highly confidential information about its rival companies from identities of their customers and suppliers. Therefore, the importance of anonymous communication is increasing as more people are being involved in network based communication. • Anonymous networks are ones that enable message senders to send their messages without disclosing their identities, and various anonymous networks had been proposed already, Mix net, DC-net , Crowds, etc., to protect secrets of entities that communicate through networks.
  • 4. • To protect privacy • Avoid tracking by advertising companies • Viewing sensitive content • Information on medical conditions • Advice on bankruptcy • Protection from prosecution • Not every country guarantees free speech • Downloading copyrighted material • To prevent chilling-effects • It’s easier to voice unpopular or controversial opinions if you are anonymous
  • 5. • “If you’re not doing anything wrong, you shouldn’t have anything to hide.” • Implies that anonymous communication is for criminals • The truth: who uses ? • Journalists • Law enforcement • Human rights activists • Normal people  Business executives  Military/intelligence personnel  Abuse victims
  • 6. 1. no one except senders of messages can know identities of the senders 2. message senders can confirm their message arrivals at their receivers without disclosing their identities 3. receivers can send reply messages back to the senders without knowing the senders’ identities 4. anonymous networks must be able to protect themselves from accesses from unauthorized entities 5. anonymous networks must maintain their performances as same as usual ones.
  • 7. • Symmetric algorithms • Conventional algorithms • Encryption and decryption keys are the same • Examples: DES, 3DES, AES, Blowfish • Asymmetric algorithms • Commonly known as Public Key algorithms • Encryption key and decryption key are different • Examples: Diffie-Hellman, RSA, Elliptic curve 7
  • 8. • Let’s say we have a plaintext message M • … a symmetric encryption algorithm E • … and a key K M  E(K, M) = C  E(K, C) = M • Advantages: • Fast and easy to use • Disadvantages • How to securely communicate the key? 8 Cyphertext C Symmetric encryption is reversible
  • 9. • A different approach to anonymity than Crowds • Originally designed for anonymous email • David Chaum, 1981 • Concept has since been generalized for TCP traffic • Hugely influential ideas • Onion routing • Traffic mixing • Dummy traffic (a.k.a. cover traffic) Drawbacks • RSA or ElGamal, and does not work efficiently in large scale systems where number of senders send large volume of messages. • A lot of computation overheads are needed to encrypt and decrypt messages.
  • 10. • Mixes form a cascade of anonymous proxies • All traffic is protected with layers of encryption 10 Mix <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS>[KP , KP , KP] Encrypted Tunnels Non-encrypted data E(KP , E(KP , E(KP , M))) = C
  • 11. 11 <KP, KS> <KP, KS> <KP, KS>
  • 12. 12 • Links between users use public key crypto • Users may appear on the path multiple times Final Destination
  • 13. • No source anonymity • Target receives m incoming messages (m may = 0) • Target sends m + 1 outgoing messages • Thus, the target is sending something • Destination anonymity is maintained • If the source isn’t sending directly to the receiver
  • 14. • Source and destination are anonymous • Source and destination are jondo proxies • Destination is hidden by encryption
  • 15. 15 • The good: • Crowds has excellent scalability • Each user helps forward messages and handle load • More users = better anonymity for everyone • Strong source anonymity guarantees • The bad: • Very weak destination anonymity • Evil jondos can always see the destination • Weak unlink ability guarantees
  • 16. • Basic design: a mix network with improvements • Perfect forward secrecy • Introduces guards to improve source anonymity • Takes bandwidth into account when selecting relays: Mixes in Tor are called relays • Introduces hidden services: Servers that are only accessible via the Tor overlay
  • 17. • Largest, most well deployed anonymity preserving service on the Internet • Publicly available since 2002 • Continues to be developed and improved • Currently, ~5000 Tor relays around the world • All relays are run by volunteers • It is suspected that some are controlled by intelligence agencies • 500K – 900K daily users • Numbers are likely larger now, thanks to Snowden 17
  • 18. • Drawbacks it is vulnerable to timing attacks Same drawbacks with mixnet Entry/ Guard Middle Exit Source: known Dest: unknown Source: unknown Dest: unknown Source: unknown Dest: known Source: known Dest: known
  • 19. • ESEBM (Enhanced Symmetric Key Encryption based Mix net) is proposed that removes drawbacks of existing anonymous networks by using symmetric key encryption functions. • ESEBM consists of two parts, they are the CP generator (offline) and the anonymous channel (online) each of which is configured as a sequence of servers • senders obtain secret keys of individual servers in the anonymous channel for encrypting their messages from the CP generator as off-line processes.
  • 20. • ESEBM can be considered as a kind of decryption type Mixnet, in which asymmetric key encryption functions are replaced by symmetric ones • ESEBM consists of 2 parts, i.e. the anonymous channel and the concealing pattern generator(CP generator). • The anonymous channel is configured as a sequence of N servers as same as Mixnet, and the CP generator consists of Z-groups, where the g-th group is configured by Ng servers,
  • 21. S= sender, Ms = Long message (Is divided into multiple frame), Lm = Fame message length, server Tj that had generated xj(h) = CP constructor Qj (h)= Tag constructor CP, X(h) = x1(h)⊕x2(h)--- ⊕xN(h) encrypting it to MS⊕X(h) tags vector Q(h) = {Q1(h), Q2(h), ---, QN(h)}
  • 22. • each server Tj in the CP generator generates its h-th CP constructor xj(h), and the h-th concealing pattern X(h) is constructed as XOR of them, i.e. X(h) = x1(h)⊕x2(h)---⊕xN(h). Then, S sends MS to the first server T1 in the anonymous channel while encrypting it to MS⊕X(h). • each server in the anonymous channel stores its receiving messages until it receives the predefined number of messages, and decrypts, shuffles and forwards them to its neighboring server untie reach final destination. • usual Mixnet where all senders encrypt their messages by using the same single public encryption key of each mixserver, in ESEBM, senders encrypt different messages by using different CPs • Therefore to enable Tj to identify its CP constructor xj(h) that constitutes X(h) for encrypting MS, The message part maintains encrypted message MS, i.e. MS ⊕ X(h), and the tag part maintains a sequence of tags vector Q(h) = {Q1(h), Q2(h), ---, QN(h)} • CP generator generates 2 kinds of secret encryption keys shared between senders and individual servers, the one is CPs and the other is tag vectors (TVs). The CP generator is a set of server groups, each of which consists of at least 3 servers that generate their secret CP constructors and TV constructors
  • 23. CP generator generates 2 kinds of secret encryption keys shared between senders and individual servers, the one is CPs and the other is tag vectors (TVs). The CP generator is a set of server groups, each of which consists of at least 3 servers that generate their secret CP constructors and TV constructors independently of others to construct CPs and TVs jointly with other servers.
  • 24.
  • 25. • firstly, sender S sends a set of its secret private vectors (PVs) {P1(h), P2(h), ---, PN1(h)} as a request for a CP to servers T1*, T2*, ---, TN1*, respectively, as shown in Fig. 3 (a). Here, each Pj(h) is vector {pj0(h), pj1(h), ---pjN(h)} and except pj0(h), pjk(h) is a bit pattern of the same length as element qjk(h) in TV constructor qj(h). Bit pattern pj0(h) has the same length as CP constructor xj(h). • Then, X(1, h) and Q(1, h), the h-th CP and TV that the 1st group generates, are constructed by 1st server T1*as X(1, h) = p10(h) ⊕ x1*(h) Q(1, h) = {p11(h), p12(h), ---,p11*(h) ⊕ ID1*(x1*(h), q1*(h)), p1(1*+1)(h) ⊕ q1*(1*+1)(h),p1(1*+2)(h) ⊕ q1*(1*+2)(h), ---, p1N(h) ⊕ q1*N(h)} • X(1, h) and Q(1, h) are then forwarded to T2*. However, to protect them from eavesdropping, they are encrypted by the secret key k1* that is shared between T1* and T2*
  • 26.
  • 27.
  • 28. • TNr# in the r-th group generates group blinding vector B(h) = {B1(h), B2(h), ---, BNr(h)}
  • 29. • Then, T1(N1) sends X(h) and Q(h) = {Q1(h), Q2(h), ---, QN(h)} to sender S, and S removes private vectors PVs from X(h) and Q(h) by XORing them by PVs. As the result, finally CP and TV values become as (12) and (13).
  • 30.
  • 31. • S also attaches tag vector Q(h) = {Q1(h), Q2(h),---, QN(h)} corresponding to X(h), to the message, and sends {MS = x1(h)x2(h) ⊕ --- ⊕ xN(h) ⊕ MS, Q1(h), Q2(h),---, QN(h)} to the 1st server T1 in the anonymous channel. Here, Q1(h) has the form ID1(x1(h), q1(h)). • MS and Qj(h) become MS =x1(h) ⊕(x1(h) ⊕ x2(h) ⊕ --- ⊕ xN(h) ⊕ MS) = x2(h) ⊕ x3(h) ⊕ --- ⊕ xN(h) ⊕ MS • Qj(h) =q1j(h) ⊕(q1j(h) ⊕ q2j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕ IDj(xj(h), qj(h))) = q2j(h) ⊕ q3j(h) ⊕ --- ⊕ q(j-1)j(h) ⊕ IDj(xj(h), qj(h)). • After that, T1 removes Q1(h) from the tag part, waits for the predefined number of message arrivals, and shuffles them to forward each result to server T2.
  • 32. 1. Sender S can receive reply messages as follows. Firstly, S obtains 2 CP and TV pairs {X(h1), Q(h1)}, {X(h2), Q(h2)}, and constructs its message while attaching tag vector Q(h2) and its encrypted address 2. S constructs MS║Q(h2)║(XU(h2)⊕AS), concatenation of MS, Q(h2), and XU(h2)⊕AS. Where bit strings XU(h2) and XL(h2) are upper and lower parts of bit string X(h2), in other words, X(h2) = XU(h2)║XL(h2).
  • 35. • reply mechanism, senders can confirm the deliveries of their messages. • message travelling times increase when durations required or obtaining CPs are counted. • Among various threats to networks, DOS attacks in which meaningless or spam messages are sent to decrease availabilities of networks • The CP generator in ESEBM reduces the occurrence of DOS attacks substantially and makes forged (modified) messages detectable. • ESEBM disables entities to carry out traffic analysis attacks and replay attacks.
  • 36. • multiple PCs that worked as relay servers. Where individual PCs were equipped with 1.6GHz CPUs and 1GB of RAM and they were connected by 100Mbits/sec Ethernet. • Fig. 6 while ESEBM needs less than 6 seconds to transfer a 20Mbits message, Mixnet needs more than 3 minutes to transfer the same message. • Fig. 7 shows the volume of messages that usual non-anonymous networks, ESEBM and Mixnet can send within 1 second. These results show that, although the throughput of ESEBM is 1/4.4 of that of non-anonymous networks, it is more than 36 times higher than that of Mixnet. According to statistics , e-mail message size is 59KB on average, therefore, even in the environments used for evaluations, ESEBM can handle 7 clients at a time that send usual e-mail messages while the non-anonymous network can handle 33 clients at a time. • On the other hand, Mixnet can handle only 0.2 clients.
  • 37.
  • 38. • The capacity of ESEBM is more than 36 times higher than that of decryption type Mix net. • the CP generator configuration disables unauthorized entities to send messages because only authorized entities that had obtained secret keys from the CP generator can send messages. • ESEBM is secure against various kinds of attacks including DOS attacks and message forgeries (or modifications) that are difficult to prevent in existing anonymous networks. • symmetric key encryption functions also enable message receivers to send reply messages to the anonymous senders.
  • 39. • ESEBM can be used for large scale networks, in which number of clients exchange usual sizes of messages at less extra costs. • available, volume of messages can be processed almost in parallel. message processing time of each server in ESEBM, it consists of shuffling (31%), message decryption (26%), and others (43%). On the other hand, message processing time of each server in Mixnet consists of shuffling (0.8%), message decryption (98.6%), and others (0.6%). • Different from Mixnet in which message decryptions require 123 times of message shuffling time, in ESEBM, message decryptions require less than 0.84 times of the shuffling time. • ESEBM where messages are encrypted by their senders, in SEBM, they are encrypted by a sequence of encryption servers.
  • 40. • Enhanced symmetric key encryption based Mixnet has been proposed that removes the drawbacks of many existing anonymous networks such as Mixnet, DC-net, etc. It satisfies all the requirements of anonymous networks. • As a drawback of ESEBM, a sender must acquire a concealing pattern from the CP generator in advance to send its every message as an offline process. • CP generator (off-line) and the anonymous channel (on-line) parts, every time-consuming task is removed from the anonymous channel part and highly efficient communication becomes possible. • When senders or receivers claim that some server is dishonest, ESEBM must prove all servers are honest or detect dishonest servers if exist. Also, ESEBM must continue its operations even some of servers are out of their services.
  • 41. MD. Hasibur Rashid // MSc. In CSE, KUET, Bangladesh