Basic Course on Onion Routing
Paul Syverson a
U.S. Naval Research Laboratory f
paul.syverson@nrl.navy.mil p
SAC Summer School
Mount Allison University Aug 10, 2015
Course Outline
● Lecture 1: Basics and Formalization
• Usage examples, basic notions of traffic-secure
communications, mixes and onion routers
• Onion routing design basics: circuit construction protocols,
network discovery
• Formalization and analysis, possibilistic and probabilistic
definitions of anonymity
● Lecture 2: Security for the real world
• Simple demo of obtaining/using Tor
• Security of obtain/using Tor
• Adding network link awareness
Importance of modeling users
•
Importance of realistic and practical
•
• Adversary models Security definitions
2
“Our motivation here is not to
provide anonymous
communication, but to separate
identification from routing.”
● “Proxies for anonymous routing”. Reed,
Syverson, and Goldschlag. ACSAC 1996
A Motivational Use Case Example
● Navy Petty Officer Alice is on temporary duty
out of the U.S.
Motivational Use Case Example
● Safe back in her hotel, PO Alice wants to
read and/or post to sealiftcommand.com
1. The site is blocked where she is deployed
2. The Internet is monitored where she is deployed
6
7
Use Case Example
● Safe back in her hotel, PO Alice wants to
read and/or post to sealiftcommand.com
1. The site is blocked where she is deployed
2. The Internet is monitored where she is deployed
8