Anonymizing Protocols

Vergelijkbare documenten
Settings for the C100BRS4 MAC Address Spoofing with cable Internet.

Session Educa-on October 2013

UNECE/UNESCAP Workshop on. Electronic Trade Documents. Ulaanbaatar, Mongolia, October 2009

Technical Note #047 Auteur:Mark Vork Gemaakt op:14 februari 2003 Gewijzigd op:9 februari 2004

Process Mining and audit support within financial services. KPMG IT Advisory 18 June 2014

Ctrl Ketenoptimalisatie Slimme automatisering en kostenreductie

(Big) Data in het sociaal domein

2010 Integrated reporting

Open source VoIP Networks

The Onion Router: een overzicht

LONDEN MET 21 GEVARIEERDE STADSWANDELINGEN 480 PAGINAS WAARDEVOLE INFORMATIE RUIM 300 FOTOS KAARTEN EN PLATTEGRONDEN

Building the next economy met Blockchain en real estate. Lelystad Airport, 2 november 2017 BT Event

Netwerkbeveiliging. Sven Sanders

Egevang & Francis [Page 1] RFC 1631 Network Address Translator May 1994

Educational Technology Expertise Centre OTEC Open University of the Netherlands. Masterclass Peer-to-peer technology

Introductie in flowcharts

Digital municipal services for entrepreneurs

Tax Directors Forum. Na de hoogtij van Horizontaal Toezicht nu een klimaat waarin boetes veel dichterbij gekomen zijn? Rotterdam, 12 februari 2015

NGN. Wageningen, 30 oktober Iljitsch van Beijnum

IFRS 15 Disaggregatie van opbrengsten

What is the advantage of using expression language instead of JSP scriptlets and JSP expressions?

Infodag digitale cinema voor cultuurcentra. D2 Benelux , Geel

Insecurities within automatic update systems

Kansen en aandachtspunten van draadloos PROFINET

Report for D-Sheet Piling 9.2

XMPP. Extensible Messaging and Presence Protocol Communicatie gebeurd via kleine stukjes XML Open source Onderbouw voor Google Talk e.d.

Wi-Fi instellingen voor Windows XP

Developing an adaptive, diagnostic test of. English writing skills

small urbanism urban development with a small scale

NMOZTMKUDLVDKECVLKBVESBKHWIDKPDF-WWUS Page File Size 9,952 KB 29 May, 2016

Never trust a bunny. D. J. Bernstein University of Illinois at Chicago. Tanja Lange Technische Universiteit Eindhoven

Italian desk Chi? Lokaal aanspreekpunt is Melissa Allegrezza For information, contact Deloitte Fiduciaire

SharePoint intranet bij Barco Beter (samen)werken en communiceren

Intermax backup exclusion files

MCS Mixe Communiction Solutions Jan van Rossum. LoRa als basis voor IoT in gebouwbeheer

4 JULI 2018 Een eerste kennismaking met gemeentefinanciën en verbonden partijen voor raadsleden - vragen

TaxLab 26 maart We maken het leuker. Fiscale faciliteiten voor het familiebedrijf

OPEN TRAINING. Onderhandelingen met leveranciers voor aankopers. Zeker stellen dat je goed voorbereid aan de onderhandelingstafel komt.

Van: Hoogendoorn, Ilona (NL Rotterdam) Namens Wiersma, Reinder (NL Rotterdam)

MRV Wat is WDM Netwerk opties Een business case Referenties. Ed Zalmstra MRV Benelux

Voorkom pijnlijke verrassingen Nieuwe Controleaanpak Belastingdienst. Presentator: Remko Geveke

De impact van automatisering op het Nederlandse onderwijs

0515 FOREIGN LANGUAGE DUTCH

Een rol van (publiek) belang. Thema-sessie 5: Het perspectief vanuit de overheid - kosten. Doorn, 6 november 2014

Webapplicatie-generatie NIOC 2013

URBAN SCIENCE. Professor Nanda Piersma Michael Hogenboom

Rolf Driesen, 15de Overheidscongres, 21 Oktober 2014

BGP, Traffic Engineering, & Akamai. Niels Bakker NLnog-dag 2014

Gemeente Ridderkerk Controle jaarrekening Ridderkerk 4 juli 2019 Jesper van Koert Reinier Moet Rein-Aart van Vugt

KPMG PROVADA University 5 juni 2018

Online Resource 1. Title: Implementing the flipped classroom: An exploration of study behaviour and student performance

Wat komt er op ons af?

Cooperatiefrijden en privacy. Dataprotectie van locatiegebonden persoonsgegevens

Creating a marketplace where expertise is made available through videoconferencing. Roland Staring Community Support Manager roland.staring@surfnet.

open standaard hypertext markup language internetprotocol transmission control protocol internet relay chat office open xml

Handleiding Installatie ADS

en DMS koppelvlak Utrecht, 14 april 2011

blur Aukje Fleur Janssen & Roos Gomperts Volvo Design Challange



Optional client logo (Smaller than Deloitte logo) State of the State

Handleiding beheer lijst.hva.nl. See page 11 for Instruction in English

Heropnamen? Aan de slag!

MULTIFUNCTIONELE DIGITALE SYSTEMEN. Windows Server 2003, Server 2008 & Scan-to-file

Ervaringen in de regio Moederraad VSV Nijmegen. Carola Groenen Voorzitter VSV/ Directeur CVN Onderzoeker Radboudumc

Netherlands Ministry of Spatial Planning, Housing and the Environment. Internet practices

API...1 Identificatie...1 Opties...2 Acties...3 Webserver...6 Heartbeat...6 Buffer groottes...8

Maillijsten voor medewerkers van de Universiteit van Amsterdam

Resistance welding (RW)

file:///h:/personalsettings/digidoc/90.%20re%20update%20database%20wga%20...

Angststoornissen en hypochondrie: Diagnostiek en behandeling (Dutch Edition) Click here if your download doesn"t start automatically

Data Handling Ron van Lammeren - Wageningen UR

kubernetes It compiles, ship it! Oscar Buse 13 februari 2018 Linux User Group Nijmegen

Remote maintenance 4.0

2019 SUNEXCHANGE USER GUIDE LAST UPDATED

Technote. EnGenius Senao EOM Mesh Layer 2 configuratie Transparant netwerk

Veelgestelde vragen Corporate en Zakelijk Internet

Graphic Design. Keuzevak GD1. Raul Martinez-Orozco / raul@thecombine.nl)

De beleidsrobot. Realiteit of illusie?

Netwerken in productiesystemen. Automatiseringspiramide SCADA. Inleiding computersystemen en netwerken deel 2

SOLVING SET PARTITIONING PROBLEMS USING LAGRANGIAN RELAXATION

Ranking Verloningsoptimalisaties. Februari 2015

Themasessie MiContact Center Klantendag 2 oktober 2013

Bijlage 3 D-Sheet Piling factual report voorzetwand t.b.v. promenade

! GeoNetwork INSPIRE Atom!

1. INFORMATICUS SOFTWAREONTWIKKELING (MARBIO-EDU-01)

Chromosomal crossover

Relationele Databases 2002/2003

Crypto, Certificaten, SSL, PKI What can possibly go wrong? ISC2 cryptonight 10 juni 2014

The downside up? A study of factors associated with a successful course of treatment for adolescents in secure residential care

SHP-TS TwinArc SA SHP-TS 400W TWINARC E40 SL PRODUCT OVERVIEW

NETBITER REMOTE ACCESS FUNCTIE

Configuratie van VPN met L2TP/IPsec

ICT voorzieningen / services AP account / / leeromgeving / printen / hardware & software

Netwerkprinter Dell 1320C installeren op Ubuntu LTS - Lucid Lynx

0515 DUTCH (FOREIGN LANGUAGE)

IIA Congres Prof. Dr. Sylvie C. Bleker-van Eyk & Roel van Rijsewijk. Zeist, 10 juni 2016

Transcriptie:

nonymizing Protocols Peter van ossum adboud University Nijmegen

Motivation Electronic Voting Dining Cryptographers Network nalysis Communication Sender nonymity [ anonymous webbrowsing ] eceiver nonymity [ anonymous webserving ] Censorship esistance

Historical Overview nonymous remailers 1993 anon.penet.fi 2003 MixMinion nonymous publishing 1999 Freenet (peer-to to-peer) nonymous webbrowsing / general 1996 Onion outing (original idea Chaum 1981) 1998 Crowds (peer-to to-peer) 2003 Tor (successor of Onion outing) 2003 Tarzan, MorphMix (peer-to to-peer)

nonymous remailers/webbrowsing Forward messages via one or more relays nonymous remailer Crowds: peer-to to-peer, no encryption Onion outing: layered encryptions Tor: : extensible communication channels

nonymizing Proxy,m m m Sender anonymity No anonymity vs. observer of

Crowds,m 1 m Sender anonymity No anonymity vs. global observer

Crowds,m 1,m 3,m m 2 Sender anonymity No anonymity vs. global observer Probabilistic Forwarding

Onion outing { 2,{ 3,{,m} 3 } 2 } 1 1 3 m 2 nonymity vs. global observer

Onion outing { 2,{ 3,{,m} 3 } 2 } 1 1 3 { 3,{,m} 3 } 2 {,m} 3 m 2 nonymity vs. global observer

Tor: : Circuits tor-aware connection 1 2 ordinary connection

Tor: : Circuits {{m} 2 } 1 tor-aware connection 1 {m} 2 2 m ordinary connection

Tor: : Circuits http://tor.eff.org/cvs/tor/doc/design-paper/tor-design.html

Tor: : Circuits {{X}} {X} - Single - Double Onion Onion http://tor.eff.org/cvs/tor/doc/design-paper/tor-design.html

nonymous publishing/webserving Serve content via relays Freenet: : data-based, peer-to to-peer Tor: : server-based, rendezvous-points

Freenet nonymous Publishing Documents (instead of agents) Censorship resistance

Freenet: : outing GUID (Globally Unique Identifier) CHK (Content Hash Key) hash(data) Content SSK (Signed Subspace Key) hash( hash(pk) hash(description) ) ) ( Publisher has/is (pk,sk( pk,sk) ) ) {CHK hash(data)} sk eni8yfo3gj8uvh-u0hpkmftf6qqge/homepage/website_howto.html eni8yfo3gj8uvh-u0hpkmftf6qqge/files/0.16a/manifest.jar pk description

Every node keeps table Freenet: : outing neighbor 1 (ip-address) guid 1 guid 2 neightbor 2 (ip-address) guid 3 guid 4 equest for guid gets forwarded to neighbor with closest guid Data ripples back along path

Freenet: : outing http://freenet.sourceforge.net/papers/freenet-ieee.pdf

Freenet: : outing Nodes accumulate files with similar hash-values http://freenet.sourceforge.net/papers/freenet-ieee.pdf

Tor nonymous service [ webserver ] Initializition points serve as proxies for server endezvous points serve as proxies for client

Tor: : nonymous Publishing DS P IP 1 IP 2 P data P data query description IP 1 description, IP 1, IP 2

Design esearch Subjects Latency vs. anonymity Incentive to participate Scalability nalysis Estimation of risk of specific attacks ttacker model Formal analysis of secrecy/authentication nonymization properties Formal analysis of anonymity

ttacker Model Dolev-Yao attacker too strong Global passive adversary + bility to corrupt nodes still too strong Partial passive adversary + bility to corrupt nodes practical analysis Global passive adversary theoretical analysis Computational adversary No formal concept yet of timing attacks, statistical traffic analysis attacks

Design esearch Subjects Latency vs. anonymity Incentive to participate Scalability nalysis Estimation of risk of specific attacks ttacker model Formal analysis of secrecy/authentication nonymization properties Formal analysis of anonymity

Formal nalysis {m} k {,{m} k } k {,{m } k } k {m} k {m } k {,{m} k } k {,{m } k } k {m } k {m} k runs look the same to global observer

Formal nalysis {,{m} k } k {,{m } k } k {m} k {m } k {,{m} k } k {,{m } k } k {m } k {m} k r ² spy ( communicated with )

Formal nalysis {} k,{m} k {m} k { } k,{m} k {m } k { } k,{m } k {m } k {} k,{m } k {m} k repeated messages global observer can discover communication pattern

Formal nalysis {} k,{m} k { } k,{m } k {m} k {m } k { } k,{m} k {} k,{m } k {m } k {m} k r ² ( spy communicated with ) r ² ( spy communicated with )

Formal nalysis {m} k C D h({m} k ) E global observer can discover pattern

Formal nalysis {m} k C D h({m} k ) E r ² spy ( and are linkable)