Suche senden
Hochladen
Onion network architecture
•
8 gefällt mir
•
2,770 views
mahdi ataeyan
Folgen
OR is a technique for anonymous communication over a computer network
Weniger lesen
Mehr lesen
Internet
Melden
Teilen
Melden
Teilen
1 von 56
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Onion architecture
Onion architecture
Vidyasagar Machupalli
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
Onion Architecture with S#arp
Onion Architecture with S#arp
Gary Pedretti
Domain Driven Design Through Onion Architecture
Domain Driven Design Through Onion Architecture
BoldRadius Solutions
Onion Architecture
Onion Architecture
matthidinger
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
Crypt
Crypt
sachincrazy
Empfohlen
Onion architecture
Onion architecture
Vidyasagar Machupalli
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
Onion Architecture with S#arp
Onion Architecture with S#arp
Gary Pedretti
Domain Driven Design Through Onion Architecture
Domain Driven Design Through Onion Architecture
BoldRadius Solutions
Onion Architecture
Onion Architecture
matthidinger
aacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
Zara Nawaz
Crypt
Crypt
sachincrazy
Hybrid cryptosystem
Hybrid cryptosystem
pkgosh
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
JAYTANWANI1
Diffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
Network Security
Network Security
hj43us
Cryptography intro
Cryptography intro
ismaelhaider
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
E-mail and Encryption
E-mail and Encryption
hey4ndr3w
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
asymmetric encryption.pptx
asymmetric encryption.pptx
ab2478037
Week12
Week12
s1180181
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
Abdul Manaf Vellakodath
HifnCrypto101
HifnCrypto101
Jim Faith
cryptography and encryption and decryption
cryptography and encryption and decryption
NirajKumar620142
enkripsi and authentication
enkripsi and authentication
ahmad amiruddin
5.3. Undercover communications
5.3. Undercover communications
defconmoscow
دفترکل توزیع شده
دفترکل توزیع شده
mahdi ataeyan
Blockchanes
Blockchanes
mahdi ataeyan
Yacy search engine
Yacy search engine
mahdi ataeyan
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
mahdi ataeyan
One Time Password
One Time Password
mahdi ataeyan
Xmpp
Xmpp
mahdi ataeyan
Bitcoin
Bitcoin
mahdi ataeyan
Weitere ähnliche Inhalte
Ähnlich wie Onion network architecture
Hybrid cryptosystem
Hybrid cryptosystem
pkgosh
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
JAYTANWANI1
Diffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
Network Security
Network Security
hj43us
Cryptography intro
Cryptography intro
ismaelhaider
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
CheapSSLsecurity
E-mail and Encryption
E-mail and Encryption
hey4ndr3w
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
asymmetric encryption.pptx
asymmetric encryption.pptx
ab2478037
Week12
Week12
s1180181
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
Abdul Manaf Vellakodath
HifnCrypto101
HifnCrypto101
Jim Faith
cryptography and encryption and decryption
cryptography and encryption and decryption
NirajKumar620142
enkripsi and authentication
enkripsi and authentication
ahmad amiruddin
5.3. Undercover communications
5.3. Undercover communications
defconmoscow
Ähnlich wie Onion network architecture
(15)
Hybrid cryptosystem
Hybrid cryptosystem
Management of KEY in Cryptography and cybersecurity.pptx
Management of KEY in Cryptography and cybersecurity.pptx
Diffie-hellman algorithm
Diffie-hellman algorithm
Network Security
Network Security
Cryptography intro
Cryptography intro
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
E-mail and Encryption
E-mail and Encryption
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
asymmetric encryption.pptx
asymmetric encryption.pptx
Week12
Week12
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
HifnCrypto101
HifnCrypto101
cryptography and encryption and decryption
cryptography and encryption and decryption
enkripsi and authentication
enkripsi and authentication
5.3. Undercover communications
5.3. Undercover communications
Mehr von mahdi ataeyan
دفترکل توزیع شده
دفترکل توزیع شده
mahdi ataeyan
Blockchanes
Blockchanes
mahdi ataeyan
Yacy search engine
Yacy search engine
mahdi ataeyan
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
mahdi ataeyan
One Time Password
One Time Password
mahdi ataeyan
Xmpp
Xmpp
mahdi ataeyan
Bitcoin
Bitcoin
mahdi ataeyan
Mehr von mahdi ataeyan
(7)
دفترکل توزیع شده
دفترکل توزیع شده
Blockchanes
Blockchanes
Yacy search engine
Yacy search engine
high availability And File hosting service (OwnCloud)
high availability And File hosting service (OwnCloud)
One Time Password
One Time Password
Xmpp
Xmpp
Bitcoin
Bitcoin
Kürzlich hochgeladen
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural in villages of india
imessage0108
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
sonalikaur4
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
stephieert
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
aditipandeya
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
anamikaraghav4
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
James Anderson
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
divyansh0kumar0
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Delhi Call girls
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
divyansh0kumar0
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Kürzlich hochgeladen
(20)
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural in villages of india
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Onion network architecture
1.
Onion network architecture http://www.ataeyan.com By: Mahdi ataeyan
2.
Privacy?!
3.
Symmetrickey algorithm
4.
Public key crypto ● An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. Alice 0110101010 1101110100 0011011010 Large Random Number Key Generation Program Public Private
5.
Public key encryption ● In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. Hello Alice! Alice's private key Encrypt 6EB69570 08E03CE4 Hello Alice! Decrypt Alice's public
key Bob Alice
6.
Public key shared secret ● In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a symmetric cipher. Alice's private key Combine keys Bob's public
key 751A696C 24D97009 Alice's public key Bob's private key Alice Alice and Bob's shared secret Bob Combine keys 751A696C 24D97009 Alice and Bob's shared secret
7.
what's Onion routing? ● OR is a technique for anonymous communication over a computer network ● peeling an onion.
8.
Why onion? Message Router C Key Router
B Key Router A Key Source Router A Router B Router C Destination
9.
entry node ● First hop into the tor network.
10.
exit node ● last hop before destination.
11.
relay node ● Middle node
12.
bridge node ● nodes not listed in the tor directory to evade filtering
13.
Steps ● The originator picks nodes from the directory node and chose some node. ● the chosen nodes are ordered (chain or circuit) ●
Originator encript and send data.
14.
picks nodes from the directory node
15.
Select node
16.
After 10 minute...
17.
Who can see the message? ● the sender ● the last intermediary (the exit node) ●
the recipient
18.
endtoend encryption
19.
Tor off https off
20.
Tor off https on
21.
Tor on https off
22.
Tor on https on
23.
Weaknesses ● Timing analysis ● Intersection attacks ●
Predecessor attacks ● Exit node sniffing ● Dos nodes ● social engineering attacks
24.
Who's using tor? ● Diplomatic mission ● Militaries ●
Normal people ● Journalists ● Activists & Whistleblowers
25.
Hidden service ● anonymity websites and servers. ● accessed through onion address. ●
Abcdefghijklmnop.o nion
26.
rendezvous protocol ● computer network protocol. ● Enables network node to find each other. ●
require at least one unblocked and un NATed servers.
27.
advertise ● advertise existence ● randomly picks some relays ●
asks them to act as „introduction points“ ● send public key ● introduction points dont know service location (ip)
28.
introduction points
29.
hidden service descriptor ● the hidden service assembles a hidden service descriptor ● signs descriptor with private key. ●
uploads descriptor to a distributed hash table. ● 16 character name derived from the service's public key.onion
30.
hidden service descriptor
31.
Client rendezvous point ● client needs to know onion address. ● download the descriptor from the distributed hash table. ●
the client knows the introduction points and the right public key. ● Client select and connect to rendezvous point and telling it a onetime secret.
32.
Client rendezvous point
33.
client introduce message ● the client assembles an „introduce message“ (encrypted to the hidden service's public key) + address of the rendezvous point and the onetime secret. ● The client sends „introduce message“ to one of the introduction points. ●
introduction points delivered to the hidden service. ● the client and service remains anonymous.
34.
client introduce message
35.
Hidden Service rendezvous point ● The hidden service decrypts the client's introduce message and finds the address of the rendezvous point and the onetime secret in it. ● The service creates a circuit to the rendezvous point and sends the onetime secret to it in a „rendezvous message“.
36.
Hidden Service rendezvous point
37.
the last step ● the rendezvous point notifies the client about successful connection establishment. ● connection between client and hidden service consists of 6 relay.
38.
the last step
39.
Hidden service protocol
40.
Xyz.onion ● SHA1 hash of the public key ● the first half of the hash is encoded to Base32 ●
the suffix „.onion“ is added. ● .onion names can only contain the digits 27 and the letters az and are exactly 16 characters long.
41.
Why automaticallygenerated service name?
42.
facebookcorewwwi.onion
43.
Birthday attack ● cryptographic attack ● abuse communication between two or more parties ● 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0
10 20 30 40 50 60 70 80 90 100 Probabilityofapair Number of people 23
44.
Get specific .onion address ● Shallot ● Scallion (GPU hashing) ●
Eschalot (wordlist search)
45.
test!
46.
shallot ● https://codeload.github.com/katmagic/Shallo t/zip/master ● ./configure && make ●
./shallot ● ./shallot ^onion ● Found matching domain after 22204717 tries: onion6r33t2v3sq7.onion
47.
Shallot 1.5 GHZ ● Characters ● 1 ●
3 ● 5 ● 7 ● 9 ● 11 ● 14 ● Time to generate ● Less than 1 sec ● Less than 1 sec ● 1 min ● 7 day ● 2,5 years ● 640 years ● 2.6 milion years
48.
Hidden services
49.
Who's using hidden service ● Hitman network ● drugs ●
Child pornography ● Hacking ● Political (anarchism, ...) ● Warez
50.
Tor network hacked by FBI?
51.
Plausible deniability
52.
List of most popular onion websites ● DuckDuckGo ● The Pirate Bay ●
Facebook ● Blockchain.info ● Wikileaks ● SecureDrop
53.
Graph Relays and bridges
54.
● http://en.wikipedia.org/wiki/Onion_routing ● http://en.wikipedia.org/wiki/Tor_%28anony mity_network%29 ●
http://www.fbi.gov/news/pressrel/pressrele ases/morethan400.onionaddressesincludi ngdozensofdarkmarketsitestargetedas partofglobalenforcementactionontorne twork● https://www.torproject.org/docs/hiddenservi ces.html.en ●
55.
● https://www.eff.org/pages/torandhttps ● https://metrics.torproject.org/ ●
http://en.wikipedia.org/wiki/Plausible_deniab ility ● http://www.theguardian.com/technology/2014 /oct/31/facebookanonymoustorusersonion ●
56.
This work is licensed under a Creative Commons Attribution ShareAlike 3.0 Unported License. It makes use of the works of Kelly Loves Whales and Nick Merritt
Jetzt herunterladen