Exploring Loose Routing in Mix-Nets for Enhanced Anonymity

loose routing in mix nets n.w
1 / 7
Embed
Share

Dive into the world of mix-networks and the concept of loose routing to potentially increase anonymity in standard mix networks. Learn about the benefits, downsides, and future prospects of implementing this innovative approach.

  • Mix Networks
  • Anonymity
  • Routing
  • Network Security
  • Cryptography

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Loose Routing in Mix-Nets Mitchell Artin MitchManiaLabs.com

  2. Approach Can we use loose routing in a mix network to increase anonymity of a standard mix network? Can we defeat n-1 attacks? Standard mix network Sender picks route of mixes, encrypts for each mix, sends packet, all mixes follow this route Loose routing Mixes may not follow the route chosen by the sender If sender choses to route with N mixes, message will be routed with at least N mixes, maybe more!

  3. Standard Route Alice Mix 1 Mix 2 Bob

  4. Loose Route Alice Mix 1 flips a coin, gets a 1, picks a new next hop, encrypts message for mix 3 Mix 1 Mix 3 flips a coin, gets a 0, uses original next hop Mix 3 Mix 2 flips a coin, gets a 0, uses original next hop (destination) Mix 2 Bob

  5. Downsides Increased delays Depending on the coin we use (could be incredibly biased) messages may see significantly increased delays

  6. More Work to Be Done So far I have researched and discussed this topic with network engineers at UF Plan to implement this overlay network in python as a proof-of-concept

  7. References Chaum, David. "Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms." Communications of the ACM (1981): 84-88. Web. Serjantov, Andrei, Roger Dingledine, and Paul Syverson. "From a Trickle to a Flood: Active Attacks on Several Mix Types." (2002): n. pag. The Free Haven Project. Web. Newman-Wolfe, Richard. "High Level Prevention of Traffic Analysis." Computer Security Applications Conference (1991): 102-09. Web.

Related


More Related Content