Onion Routing

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 3: Line 3:
== Onions ==
== Onions ==
-
Onions are created by the sender of a message, who first determines the network path along which it wishes to send a message. Each onion router on the path has its own public key.
+
Onions are created by the sender of a message, who first determines the network path it wishes to send a message. Each router on the path has its own public key.
-
The sender encrypts the message multiple times by the public keys of each of the intermediate routers. Starting with the public key of the last router on the path, and  
+
The sender encrypts the message multiple times with the public keys of each of the intermediate routers. Starting with the public key of the last router on the path, and  
continually encrypting the message with the previous router's public key. The final message to be sent is encrypted with the public key of the first router in the path.
continually encrypting the message with the previous router's public key. The final message to be sent is encrypted with the public key of the first router in the path.
<p>
<p>
The concept of the '''onion''' data structure is based on the idea of 'peeling off' layers of the onion at each intermediate node to reveal information for that specific node.  
The concept of the '''onion''' data structure is based on the idea of 'peeling off' layers of the onion at each intermediate node to reveal information for that specific node.  
-
The first router on the path decrypts the onion with its private key, which reveals the address of the second router on the path, and finally sent to that address. The newly 'peeled
+
The first router on the path decrypts the onion with its private key, which reveals the address of the second router on the path, and then sends the message to that address.  
-
off' onion can now be decrypted by router two with its private key. This process is continued until the final onion router is reached.  
+
The newly 'peeled off' onion can now be decrypted by router two with its private key. This process is continued until the final onion router is reached.  
 +
[[Image:http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/anonion.png]]
== Anonymous Communication ==
== Anonymous Communication ==

Revision as of 23:08, 28 March 2009

Onion Routing provides a way for two computers to communicate on a network anonymously. In order for this to work, a message is encrypted and placed inside an 'onion'. The intermediate nodes along the path, called onion routers, decrypt (peel off a layer) of the onion to reveal the next router along the path to receive the onion.

Contents

Onions

Onions are created by the sender of a message, who first determines the network path it wishes to send a message. Each router on the path has its own public key. The sender encrypts the message multiple times with the public keys of each of the intermediate routers. Starting with the public key of the last router on the path, and continually encrypting the message with the previous router's public key. The final message to be sent is encrypted with the public key of the first router in the path.

The concept of the onion data structure is based on the idea of 'peeling off' layers of the onion at each intermediate node to reveal information for that specific node. The first router on the path decrypts the onion with its private key, which reveals the address of the second router on the path, and then sends the message to that address. The newly 'peeled off' onion can now be decrypted by router two with its private key. This process is continued until the final onion router is reached. File:Http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/anonion.png

Anonymous Communication

Vulnerabilities

Tor

See Also

External Links

References

1. Onion Routing for Anonymous Communications. http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/index.html.

2. Onion Routing. http://www.onion-router.net/Summary.html.

Personal tools