12.07.2015 Views

Hiding Routing Information - Onion Routing

Hiding Routing Information - Onion Routing

Hiding Routing Information - Onion Routing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. \<strong>Hiding</strong> <strong>Routing</strong> <strong>Information</strong>,"Workshop on <strong>Information</strong> <strong>Hiding</strong>, Cambridge, UK, May, 1996.Zexp_time z ,Y,F bz ,K bz ,F fz ,K fz ,Yexp_time y ,X,F by ,K by ,F fy ,K fy ,Xexp_time x ,W,F bx ,K bx ,F fx ,K fx ,W exp_timew ,NULL,NULL,NULL,NULL,NULL,{IDENTITY,F bx ,K bx ,F fx ,K fx ,F by ,K by ,F fy ,K fy ,F bz ,K bz ,F fz ,K fz ,PADDING}Fig. 4. A Reply <strong>Onion</strong>.initiator's proxy node. Internally to the intermediate nodes, the forward cryptographicfunctions are applied to data moving in the direction that the circuit wasestablished, and the backward cryptographic functions are applied to data movingin the opposite direction. The location of the terminal Proxy/<strong>Routing</strong> Nodesare in this sense reversed, with the initiator's proxy at the end of the circuit andthe responder's proxy at the beginning of the circuit. However, the behavior ofthe initiator and responder proxies is identical to their behavior in the virtualcircuit formed by a forward onion. This is the reason for having forward andbackward function/key pairs at each layer of the onion.Like a forward onion, a reply onion can only be used once. When a nodereceives an onion it is kept until it expires, and any onion received is comparedto detect replay. If a replay is detected, it is treated as an error and ignored.Since reply onions can only be used once, if multiple replies are desired, multiplereply onions must be sent. Of course, they need not all follow the same returnroute; although they may. If replies are only likely to be forthcoming if they areanonymous, one or more reply onions can be broadcast. Anyone can then replywith an unused onion. If he can maintain anonymity from or in cooperation withthe responder's proxy for that reply onion, then he can do so anonymously.4 ImplementationThe easiest way to build our system without requiring the complete redesign anddeployment of new client and server software is to make use of existing proxytechnologies. Historically, proxy technologies have been used to create tunnelsthrough a rewall. The use of proxy technologies requires that the client applicationsbe `proxy aware'. The widespread deployment of rewalls on the Internethas created the demand for such proxy aware applications, which software manufacturersare rushing to meet.9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!