Verified Document

How Tor Improved The Onion Routing Design Research Paper

1 Onion Routing uses a flexible communications infrastructure that prevents traffic from being analyzed and eavesdropping from occurring. The way it works is by separating routing from identification techniques. In other words, any identifying information is removed from the data stream (Syverson, 2005).

The structure is created by wrapping a plaintext message in layers of encryption. Just as an onion has layers that peel away, this wrapping is successively pealed away as the wrapped message is passed through from one router to the next. The message is viewable only by the sender and the recipient and perhaps even the last node, unless end-to-end encryption is used (Joshi, 2012).

For example, in a packet switched network, packets use a header for routing and the payload confers the data. The header is visible to the network and anyone watching the network; it tells where the packet originated and where it is going. Encryption and obscuration do not prevent identification.

Onion Routing allows for anonymity by using socket connections, which are placed below the application layer and depend upon the application. Proxies are use to make the data stream anonymous. For example, an application will establish a socket connection to an Onion Routing Proxy. The proxy then links anonymously to its destination via other Onion Routers.

2

An Onion Routing network is resistant to both network eavesdropping and traffic analysis because it blocks the normal identifying characteristics of packet data within the public network using layers of protection. As the data...

As each layer is removed, the data has a different appearance for anyone watching; it would be like someone following a suspect who keeps changing his appearance at every depot station: he is impossible to track unless one knows in advance what the suspect will be changing into. Since only the suspect knows that, the tail cannot possibly follow. In the Onion Routing network, anonymity is preserved in the same way. Eavesdropping is prevented due to the encryption that takes place between Onion Routers. Thus, even if one router is compromised, eavesdropping is still not likely. Only if every router on the path is compromised will data be possibly tracked, and the likelihood of such occurring is very low.
Each router is only able to know the identity of the adjacent router along the connection route. Data is encrypted in layers along the way so that at each router, one layer is removed. Since data appears differently at each Onion Router along the way, the information cannot be tracked. All information about the connection is cleared from each Onion Router when the connection is ended. Thus, anonymity is preserved over a public network.

However, a local eavesdropper could see that someone has sent or received a message—but the local eavesdropper won’t be able to determine the identities of both the sender or the receiver: only one or the other (Joshi, 2012).

3

Tor is a “circuit-based low-latency anonymous communication service” that is a…

Sources used in this document:

References

Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation

onion router. Naval Research Lab Washington DC.

Joshi, P. (2012). Onion routing. Retrieved from

https://prateekvjoshi.com/2012/11/27/onion-routing/

Syverson, P. (2005). Onion routing. Retrieved from

https://www.onion-router.net/Summary.html



 

Cite this Document:
Copy Bibliography Citation

Related Documents

Encryption Is the Translation of
Words: 761 Length: 3 Document Type: Term Paper

The other is a private key that you use to decrypt messages that you receive" (Pretty pp). PGP is such an effective encryption tool that the United States Government actually brought a lawsuit against Zimmerman for putting it in the public domain and therefore making it available to enemies of the United States, however, after a public outcry, the government's lawsuit was dropped, yet it is still illegal to use PGP

Encryption Technology and the Patriot
Words: 319 Length: 1 Document Type: Thesis

(Proposed encryption, 2004, USA Today). As Bruce Schneier's text Schneier on Security indicates, encryption is being increasingly used by watchful and responsible people to protect their security online. The concern about implicating an innocent person or giving a harsh sentence to someone for a minor offense is not far-fetched given the ubiquitous nature of encryption technology. The useful and benign nature of encryption means that to increase the potential

Encryption Do We Need By
Words: 339 Length: 1 Document Type: Term Paper

but, just because other countries have weaker standards doesn't necessarily mean that the U.S. should. Walker quotes an Electronic Frontier Canada representative as saying that, "Export controls have had the general result of weakening the encryption standards available off the shelf in the U.S. And Canada." To her credit, Walker provides an alternative view by a senior officer of a security vendor saying that existing encryption, digital signatures and

PGP Encryption, Better Known As Pretty Good
Words: 568 Length: 2 Document Type: Essay

PGP Encryption, better known as Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication. Phil Zimmerman, the developer of PGP, introduced his invention in 1991. Since then, major improvements have been made to the computer program and is now available from PGP Corporation and other companies. The original intent of PGP was to encrypt email and attachments. PGP encryption applications have expanded to a variety of components

Data Encryption
Words: 1804 Length: 7 Document Type: Term Paper

Encryption With the ever-increasing amount of information traffic on the net (LAN, WAN, etc.) there is a corresponding increase in the risk of vital data falling into the wrong hands. Data encryption is a technology that provides for a safe, secure and private information exchange. The advancement of computer technology has bought a paradigm shift to our mode of communication. The Internet has managed to overcome all the geographical limitations and

Cellular Phones and Encryption
Words: 1852 Length: 5 Document Type: Essay

4G LTE Encryption When cellular phones first came out, the concerns about data loss and theft was not all that high. This was mostly because these devices functioned mostly (if not entirely) as phones with perhaps a camera phone here and there. Nowadays, however, cellular phones are often smartphones and they are literally small computers in terms of the data that they carry and the abilities that they have. Given that

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now