docx

School

Liberty University *

*We aren’t endorsed by this school

Course

620

Subject

Computer Science

Date

Jun 11, 2024

Type

docx

Pages

6

Uploaded by PresidentFire53

Report
Running head: ONION ROUTING AND TOR 1 Onion Routing and Tor Writing Assignment Loaze-Noha Ngassaki Ikounga Ongania Liberty University CSCI 620 April 22, 2024
Running head: ONION ROUTING AND TOR 2 Security Issues in Peer-to-Per Networks Writing Assignment 1. Describe the infrastructure of Onion Routing and explain how it works for providing anonymity over a public network. One method for guaranteeing anonymity on open networks, such as the internet, is onion routing. Data is encrypted numerous times and routed via a variety of network nodes called onion routers for it to function. Until the data reaches its final destination, a layer of encryption is removed at each node, exposing the next destination. "Onion" refers to the additional encryption layers that are applied to the data. Onion Routing's architecture is made up of three primary parts. The first type of node that the data flows through are called onion routing nodes. Only one layer of encryption is broken by each node before the data is sent to the following node. Enhancing anonymity, neither the sender nor the recipient knows the identity or location of these nodes. The second one is Encryption Data, which is encrypted in many layers, each of which is associated with a distinct network node. In order to prevent any one node from having access to all of the data or from knowing the full communication path, each layer can only be decrypted by the relevant node. The final one is Path Selection, which is the process by which a path via many nodes is dynamically chosen when a user establishes a connection using Onion Routing. It is difficult for adversaries to predict or intercept the complete communication channel due to this routing, which is frequently randomly generated by algorithms. "The prudent sees danger and hides himself, but the simple go on and suffer for it," says Proverbs 27:12 (ESV). This passage emphasizes how crucial it is to take safety precautions. In the context of the topic, onion routing serves as a prudent measure to conceal one’s online activities and safeguard privacy.
Running head: ONION ROUTING AND TOR 3 2. Explain how an Onion Routing network is resistant to both network eavesdropping and traffic analysis. Onion routing networks are designed to be immune to network eavesdropping and traffic analysis by employing a variety of approaches. One of these is End-to-End Encryption, which ensures that the data remains encrypted until it reaches its destination by utilizing Onion Routing at each encryption layer. This prevents others from intercepting and analyzing talks as they go over the network. Randomized Routing Pathways are additional. Because the routing paths in onion routing are selected at random, it is more difficult for attackers to monitor and analyze traffic patterns. Because of its unpredictable nature, they are unable to ascertain the communication's source, destination, or content. The ongoing update of route paths by the Onion route networks is another problem that makes things challenging, which makes it more difficult to do traffic analysis or eavesdrop. Because of the network's dynamic structure, it is challenging for attackers to regularly monitor and intercept messages. Psalm 25:15 says, "My eyes are ever on the Lord, for only he will release my feet from the snare." This passage highlights the value of being alert and depending on God to keep you safe from snares and traps. In terms of network security, onion routing provides a way to avoid surveillance traps and preserve privacy. 3. Describe the design of Tor. Tor is an Onion Routing system that aims to facilitate anonymous online communication. It adds new functionality and enhances security and usability while expanding on the ideas of onion routing. There are several important parts to Tor's design. Users utilize the Tor Client program to get access to the Tor network. Data is encrypted
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Running head: ONION ROUTING AND TOR 4 and sent to its intended location via a network of Tor nodes. A decentralized network of nodes run entirely by volunteers; the Tor Network relays traffic for its users. Entry nodes, middle nodes, and exit nodes make up the network, and they are all in charge of various phases of data transmission. The development of hidden services, or servers or webpages that are only accessible through the Tor network is possible. By hiding the server's identity and location, these services improve anonymity and privacy. One part of Tor that creates circuits, or pathways, through the network for every connection is called Circuit Establishment. Traffic analysis and correlation attacks are thwarted by the dynamic creation and modification of these circuits. Tor's Traffic Encryption ensures end-to-end encryption and anonymity by encrypting data many times as it travels over the network. It says in Ephesians 6:12 "For our struggle is not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms." We are reminded of the forces and wars that are at play in the world by this verse. Tor can be viewed as a technique to guard against the control and monitoring those invisible entities in the digital world exercise. 4. Compare Tor and the original Onion Routing. Show the improvements of the Tor design made over Onion Routing. Tor is a development of the original Onion Routing idea, with several modifications and advancements. To begin, while both Tor and Onion Routing rely on a network of nodes, Tor is more decentralized since it uses a higher number of volunteer- operated nodes. This decentralization increases security and resistance to assaults. Second, Tor introduces the notion of hidden services, which enable users to host websites and servers anonymously on the Tor network. This functionality did not appear in the
Running head: ONION ROUTING AND TOR 5 original Onion Routing architecture. Third, Tor has a simple interface and client software, making it more accessible to non-technical users than the original Onion Routing implementation, which frequently required manual configuration and setup. Fourth, Tor includes a variety of security improvements and bug fixes that were not available in the original Onion Routing implementation. The network's overall security and dependability are improved by these upgrades.
Running head: ONION ROUTING AND TOR 6 References Huang, H., & Bashir, M. (2016). The onion router: Understanding a privacy enhancing technology community.  Proceedings of the ASIST Annual Meeting, 53 (1), 1- 10. https://doi.org/10.1002/pra2.2016.14505301034 Reed, M. G., Syverson, P. F., & Goldschlag, D. M. (1998). Anonymous connections and onion routing.  IEEE Journal on Selected Areas in Communications, 16 (4), 482- 494. https://doi.org/10.1109/49.668972 Wang, C., Ren, Y., & Wu, Z. (2024). Multi‐Hop anonymous payment channel network based on onion routing.  IET Blockchain,  https://doi.org/10.1049/blc2.12065
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help