Exploring Onion Routing: Anonymity, Security, and Tor Design

.docx

School

Liberty University *

*We aren’t endorsed by this school

Course

620

Subject

Computer Science

Date

Jun 11, 2024

Type

docx

Pages

6

Uploaded by PresidentFire53

Running head: ONION ROUTING AND TOR 1 Onion Routing and Tor Writing Assignment Loaze-Noha Ngassaki Ikounga Ongania Liberty University CSCI 620 April 22, 2024
Running head: ONION ROUTING AND TOR 2 Security Issues in Peer-to-Per Networks Writing Assignment 1. Describe the infrastructure of Onion Routing and explain how it works for providing anonymity over a public network. One method for guaranteeing anonymity on open networks, such as the internet, is onion routing. Data is encrypted numerous times and routed via a variety of network nodes called onion routers for it to function. Until the data reaches its final destination, a layer of encryption is removed at each node, exposing the next destination. "Onion" refers to the additional encryption layers that are applied to the data. Onion Routing's architecture is made up of three primary parts. The first type of node that the data flows through are called onion routing nodes. Only one layer of encryption is broken by each node before the data is sent to the following node. Enhancing anonymity, neither the sender nor the recipient knows the identity or location of these nodes. The second one is Encryption Data, which is encrypted in many layers, each of which is associated with a distinct network node. In order to prevent any one node from having access to all of the data or from knowing the full communication path, each layer can only be decrypted by the relevant node. The final one is Path Selection, which is the process by which a path via many nodes is dynamically chosen when a user establishes a connection using Onion Routing. It is difficult for adversaries to predict or intercept the complete communication channel due to this routing, which is frequently randomly generated by algorithms. "The prudent sees danger and hides himself, but the simple go on and suffer for it," says Proverbs 27:12 (ESV). This passage emphasizes how crucial it is to take safety precautions. In the context of the topic, onion routing serves as a prudent measure to conceal one’s online activities and safeguard privacy.
Running head: ONION ROUTING AND TOR 3 2. Explain how an Onion Routing network is resistant to both network eavesdropping and traffic analysis. Onion routing networks are designed to be immune to network eavesdropping and traffic analysis by employing a variety of approaches. One of these is End-to-End Encryption, which ensures that the data remains encrypted until it reaches its destination by utilizing Onion Routing at each encryption layer. This prevents others from intercepting and analyzing talks as they go over the network. Randomized Routing Pathways are additional. Because the routing paths in onion routing are selected at random, it is more difficult for attackers to monitor and analyze traffic patterns. Because of its unpredictable nature, they are unable to ascertain the communication's source, destination, or content. The ongoing update of route paths by the Onion route networks is another problem that makes things challenging, which makes it more difficult to do traffic analysis or eavesdrop. Because of the network's dynamic structure, it is challenging for attackers to regularly monitor and intercept messages. Psalm 25:15 says, "My eyes are ever on the Lord, for only he will release my feet from the snare." This passage highlights the value of being alert and depending on God to keep you safe from snares and traps. In terms of network security, onion routing provides a way to avoid surveillance traps and preserve privacy. 3. Describe the design of Tor. Tor is an Onion Routing system that aims to facilitate anonymous online communication. It adds new functionality and enhances security and usability while expanding on the ideas of onion routing. There are several important parts to Tor's design. Users utilize the Tor Client program to get access to the Tor network. Data is encrypted
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help