Published on Apr 02, 2024
WELCOME TO THE SEMINAR
ON
Anonymous Communication
Introduction
==> Anonymous communication is a necessary measure to protect the privacy of users, and protect computer systems against traffic analysis.
==> Anonymity systems seeks to build an infrastructure running on top of the existing Internet protocols that allows people to communicate with each other without necessarily revealing their personal network identifiers.
==> The basic idea behind any anonymous system is to provide unlinkability between communicating parties by relaying traffic through a number of intermediate nodes
==> All the anonymous systems are used by diverse group of users to protect their identities on the Internet
What Is Anonymous Communication
==> Figure
CHAUM'S MIX
==> It is a concept introduced by David Chaum which is based on public key cryptography that allows an electronic mail system to hide whom a participant communicates with as well as the content of the communication .
==> The basic building block of such a high latency anonymous communication systems is a mix.
==> The principal idea is that messages to be anonymized are relayed through a mix.
==> The mix has a well-known RSA public key, and messages are divided into blocks and encrypted using this key.
CHAUM'S MIX Figure
==> Figure
Mix Networks
==> More level of anonymity can be achieved by using a series of mixes instead of a single mix.
==> In mix networks senders can choose an ordered sequence of mixes through which to send their messages.
==> In a mix cascade topology, there are one or more predefined routes through which all client traffic is relayed.
==> If Alice wants to anonymously send a message M to Bob via a path P = {x, y, z} , she would iteratively create a layer of encryption, in the same manner as above, for each mix starting with the last mix in the path and working back toward the first.
Onion Routing
==> The objective of the onion routing is to protect the unlinkability between the communicating parties for real time applications that can tolerate only low latency.
==> The system consist of a set of servers called onion routers that relay traffic for clients.
==> Here anonymity is achieved by passing messages through a sequence of randomly selected onion routers to destination.
Establishing Circuit
==> Figure
TOR
==> The Onion Router Tor is the most recent evolution of onion routing and represents the current state-of-the-art in low-latency anonymity systems.
==> The Tor design makes several modifications and improvements over the original onion routing design in terms of security, efficiency, and deployability.
==> Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency.
==> The Tor network is currently the largest deployed anonymity network ever, consisting of over 1000 servers and more than an estimated 250,000 users as of December 2007
Conclusion
==> Researches in the last 30 years have made significant progress towards enabling private and anonymous communication on the Internet.
==> With an increasing level of public awareness about threats to personal privacy, such as identity theft or online advertisers tracking user behavior, academic and public interest in anonymous communication systems is likely to continue to increase in the near future.
==> As a result public and academic interest in improving existing systems for anonymity is also increasing.
References
==> www.seminarsonly.com
==> mail : contactv2@gmail.com
Are you interested in this topic.Then mail to us immediately to get the full report.
email :- contactv2@gmail.com |