SlideShare a Scribd company logo
1 of 25
Onion Routing
2
Goals
 Introduction
 Overview of onion routing
 Explanation of security goals
 Description of network model &
assumptions
 Discussion of adversary types
 Comparison with Crowds
 Tor
 Future Works
3
Why anonymous communication?
 Public Networks are Vulnerable to
Traffic Analysis
 Encryption does not hide routing
information.
 The simple fact that two parties are
communicating can be used to link the two
parties.
4
Who Needs Anonymity?
 Political Dissidents, Whistleblowers
 Censorship resistant publishers
 Socially sensitive communicants
- Chat rooms and web forums
 Law Enforcement:
− Anonymous tips or crime reporting
− Surveillance and honeypots
 Corporations
5
Onion routing
 Onion routing - an application independent
infrastructure for private communication over a
public network.
 Provides anonymous
connections that are
resistant to both traffic
analysis and evesdropping
6
2.Onion Routing Overview
 Onion router ≈ real time Chaum mix
 Store and forward with minimal delays
7
 Onion routing connection phases
 Connection Setup
 Data Movement (Transmission)
 Connection Termination (Teardown)
8
Setup Phase
 Connection initiator builds an onion
 Layered cryptographic structure, specifying:
 Path through network
 Point-to-point symmetric encryption algorithms
 Cryptographic keys
 At each step
 Router decrypts entire structure
 Sets up encrypted channels to predecessor and
successor nodes
 Forwards new onion on to successor
9
Transmission Phase
 When connection initiator wants to send data
 Break data into uniform (128 bit) blocks
Encrypt each block once for each router in the
path
-Uses symmetric encryption here
 Send data to first onion router
 All onion routers connected by persistent TCP
thick pipes which add another layer of
encryption on top of all of this encryption!
10
Onion Routing Overview
11
12
Connection Termination
 By the initiator or the destination server
 Since onion routers may fail, however,
any onion router involved in a
connection can cause that connection to
be terminated.
13
3.Security Goals
 The goal is to hide
 Sender activity
 Receiver activity
 Sender content
 Receiver content
 Source-destination pairs
14
4.Network Assumptions
1. Onion routers are all fully connected
2. Links are padded or bandwidth-limited
to a constant rate
3. Unrestricted exit policies
4. For each route, each hop is chosen at
random
5. Number of nodes in a route is chosen
at random
15
5.Adversary Model
 4 Types of adversaries
 Observer
 Disrupter
 Hostile user
 Compromised COR
 Adversary
distributions
 Single
 Multiple
 Roving (realistic)
 Global
16
6.Comparison with other
anonymity mechanisms
 Mixes
 Proxies
 Crowds
17
 Any compromised node on the path
compromises both receiver activity and
receiver content.
 Request contents are exposed to
intermediate nodes as decryption keys
are available to all the participants
Limitations of crowds
18
7. Tor
- The Onion Routing
 Tor is the most advanced implementation
of Onion Routing in use today
 Provides perfect forward secrecy
 Tor uses Diffie-Hellman key exchange
19
 Tor provides Directory Servers
- protection against compromised nodes
 Uses Leaky –pipe circuit topology
 Currently 60+ Tor nodes online
20
8.Conclusions and
future work
 No router will ever know the full path
that is traveled by the onion.
 So the communication is completely
anonymous.
21
Future improvements
 Adding a time delay to traffic at proxy could
complicate timing attacks against the local –
COR configuration to determine the first
COR.
 Using partial route padding on individual
connections besides link padding.
 Hopping short lived OR connections for
long lived application connections.
22
The second generation Onion
Routing design generally resists
traffic analysis more effectively than
any other published and deployed
mechanisms for Internet
communication .
23
References
 The Onion Routing Home Page. http://www.onion-router.net/
 https://torproject.org/
 Paul Syverson _ Gene Tsudiky,Michael Reed _ Carl Landwehr,
Towards analysis of onion routing security -2000
 D. Goldschlag, M. Reed, P. Syverson. “Onion Routing for
Anonymous and Private Internet Connections," Communications
of the ACM, vol. 42, num. 2, February 1999
 D. Goldschlag, M. Reed, P. Syverson. “Hiding Routing
Information, in Information Hiding, R. Anderson, ed., LNCS vol.
1174, Springer-Verlag, 1996, pp. 137–150.
24
Thank you
25

More Related Content

Similar to Onion Routing.ppt

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer AnamikaSinha57
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksReliance Comm
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Sasank Chaitanya
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...jeronimored
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptabdullahalamin69
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
 
Onion protocol
Onion protocolOnion protocol
Onion protocolAnshu Raj
 

Similar to Onion Routing.ppt (20)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
A370110
A370110A370110
A370110
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
F0322038042
F0322038042F0322038042
F0322038042
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
 
Question
QuestionQuestion
Question
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
M017248993
M017248993M017248993
M017248993
 
Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...Performance measurement of MANET routing protocols under Blackhole security a...
Performance measurement of MANET routing protocols under Blackhole security a...
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Onion Routing.ppt

  • 2. 2 Goals  Introduction  Overview of onion routing  Explanation of security goals  Description of network model & assumptions  Discussion of adversary types  Comparison with Crowds  Tor  Future Works
  • 3. 3 Why anonymous communication?  Public Networks are Vulnerable to Traffic Analysis  Encryption does not hide routing information.  The simple fact that two parties are communicating can be used to link the two parties.
  • 4. 4 Who Needs Anonymity?  Political Dissidents, Whistleblowers  Censorship resistant publishers  Socially sensitive communicants - Chat rooms and web forums  Law Enforcement: − Anonymous tips or crime reporting − Surveillance and honeypots  Corporations
  • 5. 5 Onion routing  Onion routing - an application independent infrastructure for private communication over a public network.  Provides anonymous connections that are resistant to both traffic analysis and evesdropping
  • 6. 6 2.Onion Routing Overview  Onion router ≈ real time Chaum mix  Store and forward with minimal delays
  • 7. 7  Onion routing connection phases  Connection Setup  Data Movement (Transmission)  Connection Termination (Teardown)
  • 8. 8 Setup Phase  Connection initiator builds an onion  Layered cryptographic structure, specifying:  Path through network  Point-to-point symmetric encryption algorithms  Cryptographic keys  At each step  Router decrypts entire structure  Sets up encrypted channels to predecessor and successor nodes  Forwards new onion on to successor
  • 9. 9 Transmission Phase  When connection initiator wants to send data  Break data into uniform (128 bit) blocks Encrypt each block once for each router in the path -Uses symmetric encryption here  Send data to first onion router  All onion routers connected by persistent TCP thick pipes which add another layer of encryption on top of all of this encryption!
  • 11. 11
  • 12. 12 Connection Termination  By the initiator or the destination server  Since onion routers may fail, however, any onion router involved in a connection can cause that connection to be terminated.
  • 13. 13 3.Security Goals  The goal is to hide  Sender activity  Receiver activity  Sender content  Receiver content  Source-destination pairs
  • 14. 14 4.Network Assumptions 1. Onion routers are all fully connected 2. Links are padded or bandwidth-limited to a constant rate 3. Unrestricted exit policies 4. For each route, each hop is chosen at random 5. Number of nodes in a route is chosen at random
  • 15. 15 5.Adversary Model  4 Types of adversaries  Observer  Disrupter  Hostile user  Compromised COR  Adversary distributions  Single  Multiple  Roving (realistic)  Global
  • 16. 16 6.Comparison with other anonymity mechanisms  Mixes  Proxies  Crowds
  • 17. 17  Any compromised node on the path compromises both receiver activity and receiver content.  Request contents are exposed to intermediate nodes as decryption keys are available to all the participants Limitations of crowds
  • 18. 18 7. Tor - The Onion Routing  Tor is the most advanced implementation of Onion Routing in use today  Provides perfect forward secrecy  Tor uses Diffie-Hellman key exchange
  • 19. 19  Tor provides Directory Servers - protection against compromised nodes  Uses Leaky –pipe circuit topology  Currently 60+ Tor nodes online
  • 20. 20 8.Conclusions and future work  No router will ever know the full path that is traveled by the onion.  So the communication is completely anonymous.
  • 21. 21 Future improvements  Adding a time delay to traffic at proxy could complicate timing attacks against the local – COR configuration to determine the first COR.  Using partial route padding on individual connections besides link padding.  Hopping short lived OR connections for long lived application connections.
  • 22. 22 The second generation Onion Routing design generally resists traffic analysis more effectively than any other published and deployed mechanisms for Internet communication .
  • 23. 23 References  The Onion Routing Home Page. http://www.onion-router.net/  https://torproject.org/  Paul Syverson _ Gene Tsudiky,Michael Reed _ Carl Landwehr, Towards analysis of onion routing security -2000  D. Goldschlag, M. Reed, P. Syverson. “Onion Routing for Anonymous and Private Internet Connections," Communications of the ACM, vol. 42, num. 2, February 1999  D. Goldschlag, M. Reed, P. Syverson. “Hiding Routing Information, in Information Hiding, R. Anderson, ed., LNCS vol. 1174, Springer-Verlag, 1996, pp. 137–150.
  • 24. 24