TOR: Onion Routing

1221 Words3 Pages

TOR

Onion routing (Syverson) is an anonymous communication technique used to anonymize network traffic. Messages are encrypted recursively and sent to multiple network nodes or onion routers; each router decrypts one layer of the message and passes it on to the next router. This prevents the transport medium to find out who you are; the network does know that onion communication is taking place.

Figure 1: An example "Onion", http://en.wikipedia.org/wiki/File:Onion_diagram.svg

An onion is a data structure that is formed by wrapping a plaintext message with successive layers of encryption, such that each layer can be unwrapped or decrypted like the layers of an onion. The plaintext message is only viewable by the sender, exit node, recipient. This can be extended to end to end encryption so that the last intermediary cannot also view the message.

TOR (Roger Dingledine) is a circuit based low-latency anonymous communication service. TOR is now in its second generation and was developed from the Onion routing program. The routing system can run on several operating systems and protect the anonymity of the user. The latest TOR version supports perfect forward secrecy, congestion control, directory servers, integrity checking and configurable exit policies. Tor is essentially a distributed overlay network which works on the application layer of the TCP protocol. It essentially anonymizes all TCP-based applications like web-browsing, SSH, instant messaging. Using TOR can protect against common form of Internet surveillance known as “traffic analysis” (Electronic Frontier Foundation). Knowing the source and destination of your internet traffic allows others to track your behavior and interests. An IP packet has a header and a dat...

... middle of paper ...

...n also use TOR to communicate more safely with whistleblowers and dissidents. TOR is also used by people in countries like China to access content blocked by the government.

Works Cited

Electronic Frontier Foundation. TOR Overview. n.d. 9 May 2014 .

Roger Dingledine, Nick Mathewson, Paul Syverson. Tor: The Second-Generation Onion Router. Washington DC: Naval Research Lab, 2004.

Syverson, Paul. Onion Routing. 2005. 9 May 2014 .

Loesing, Karsten, Steven J. Murdoch, and Roger Dingledine. A case study on measuring statistical data in the tor anonymity network." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. 203-215.

Murdoch, Steven J., and George Danezis. Low-cost traffic analysis of Tor. Security and Privacy, 2005 IEEE Symposium on. IEEE, 2005.

Open Document