Top Banner
ONION ROUTING Guided By: Smt. Geetha Raj. R Seminar By: SOUMYA BALACHANDRAN 1
28
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Seminar Ppt

ONION ROUTING

Guided By: Smt. Geetha Raj. R

Seminar By: SOUMYA BALACHANDRAN

1

Page 2: Seminar Ppt

What is Onion Routing?

An application independent infrastructure for traffic analysis resistant and anonymous internet connections.

Uses Public Key Exchange.

2

Page 3: Seminar Ppt

GOAL

Primary• Strongly private

communication.• Cannot

determine the content of the message

Secondary• Anonymity

to sender and receiver

3

Page 4: Seminar Ppt

4

Page 5: Seminar Ppt

OVERVIEW

5

Page 6: Seminar Ppt

HOW SECRET MESSAGES ARE

SENT??

6

Page 7: Seminar Ppt

Onion Routing exist in three phases

Connection Setup Data Movement Connection Termination

7

Page 8: Seminar Ppt

1) Client application connects to

application proxy.

2) Packets are forwarded to onion proxy.

3) Onion is passed on to an

entry funnel.

4) At each onion router a layer of

onion is decrypted.

5) At exit funnel, the decrypted packet sent to destination TCP

host.

6) A status message sent

back to application proxy.

7) Connection terminated.

8

Page 9: Seminar Ppt

HOW ONIONS ARE CREATED AND FORWARDED??

9

Page 10: Seminar Ppt

10

Page 11: Seminar Ppt

Number all routers 1…N.

Public key Su (known to onion proxies).

Private key Sr (known only to routers)

Encryption function:- E[Key](data)

Decryption function:- D[Key](data)

Encrypted with public key and decrypted

with private key

D[Sr](E[Su](data)) = data.

11

Page 12: Seminar Ppt

EXAMPLE

12

Page 13: Seminar Ppt

Onion Created by proxy

E[4u](3’s IP address, E[3u](5’s IP address, E[5u](data))).

13

12

3

4

5

6

Page 14: Seminar Ppt

14

Page 15: Seminar Ppt

Sender Activity

Receiver Activity

Sender Content

Receiver Content

SECURITY GOALS

15

Page 16: Seminar Ppt

Observer

Disrupter

Hostile User

Compromised COR.

ADVERSARIES???

16

Page 17: Seminar Ppt

WEAKNESS

Timing Analysis

•By analyzing the incoming and outgoing messages.

Intersection Attacks

•Nodes failure.

Predecessor Attacks

•Betrayal of compromised node.

Exit node sniffing

•Complete access to the content.

17

Page 18: Seminar Ppt

COMPARISON WITH OTHER ANONYMOUS

WORKS

18

Page 19: Seminar Ppt

19

Comparison related to

Anonymity mechanism

MIXES

REMAILERS

Connection based mechanism

ANONYMIZERS

CROWDS

Page 20: Seminar Ppt

20

OR v/s Mixes

Time delay for traffic are limited for OR.

Traffic is multiplexed and is link encrypted.

Page 21: Seminar Ppt

21

OR v/s Anonymizers

Traffic between the browser & anonymizer

sent in the clear.

Volume attack is possible by observers.

Page 22: Seminar Ppt

22

Page 23: Seminar Ppt

Provides PERFECT FORWARD SECRECY.

Uses DIFFIE-HELLMAN KEY EXCHANGE.

Any router along the route can act as the exit

funnel.

Provides with Directory Servers.

Provides a service called “Hidden Services”.

23

Page 24: Seminar Ppt

WHO USES Tor???

Family & friends.

Business.

Activists

Media

Military and law enforcements

Page 25: Seminar Ppt

CONCLUSION

The purpose of Onion Routing is to protect the anonymity.

Using Public Key Encryption, an onion is created which is sent over a set of routers to reach the destination.

25

Page 26: Seminar Ppt

REFRENCES

[1].The Onion Routing Home Page. http://www.onion-router.net/

[2]. https://torproject.org/[3]. http://tor.eff.org/[4]. D. Goldschlag, M. Reed, P. Syverson. "Onion

Routing for Anonymous and Private Internet Connections," Communications of the ACM, vol. 42, num. 2, February 1999

26

Page 27: Seminar Ppt

Thank you…

Page 28: Seminar Ppt

ANY QUESTIONS