logo资料库

洋葱路由技术基础课程1Basic Course on Onion Routing.pdf

第1页 / 共119页
第2页 / 共119页
第3页 / 共119页
第4页 / 共119页
第5页 / 共119页
第6页 / 共119页
第7页 / 共119页
第8页 / 共119页
资料共119页,剩余部分请下载后查看
Basic Course on Onion Routing Paul Syverson a U.S. Naval Research Laboratory f paul.syverson@nrl.navy.mil p SAC Summer School Mount Allison University Aug 10, 2015
Course Outline ●  Lecture 1: Basics and Formalization •  Usage examples, basic notions of traffic-secure communications, mixes and onion routers •  Onion routing design basics: circuit construction protocols, network discovery •  Formalization and analysis, possibilistic and probabilistic definitions of anonymity ●  Lecture 2: Security for the real world •  Simple demo of obtaining/using Tor •  Security of obtain/using Tor •  Adding network link awareness Importance of modeling users •  Importance of realistic and practical •  •  Adversary models  Security definitions 2
“Our motivation here is not to provide anonymous communication, but to separate identification from routing.” ●  “Proxies for anonymous routing”. Reed, Syverson, and Goldschlag. ACSAC 1996
A Motivational Use Case Example ●  Navy Petty Officer Alice is on temporary duty out of the U.S.
Motivational Use Case Example ●  Safe back in her hotel, PO Alice wants to read and/or post to sealiftcommand.com 1.  The site is blocked where she is deployed 2.  The Internet is monitored where she is deployed 6
7
Use Case Example ●  Safe back in her hotel, PO Alice wants to read and/or post to sealiftcommand.com 1.  The site is blocked where she is deployed 2.  The Internet is monitored where she is deployed 8
分享到:
收藏