Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
CNT 5410 - Computer and Network Security: Privacy/Anonymity
Professor Kevin Butler Fall 2015
CNT 5410 - Computer and Network Security: Privacy/Anonymity - - PowerPoint PPT Presentation
CNT 5410 - Computer and Network Security: Privacy/Anonymity Professor Kevin Butler Fall 2015 Southeastern Security for Enterprise and Infrastructure (SENSEI) Center When Confidentiality is Insufficient Southeastern Security for Enterprise and
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Professor Kevin Butler Fall 2015
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
2
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
being unreadable from unauthorized readers.
contents are indistinguishable from random bits.
communication between two or more parties.
the messages indicative of their content?
in the vernacular, but should not be.
3
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
4
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
read their comments.
letting you know who revealed the content itself.
5
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
6
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Modes, that allow you to visit webpages while reducing the state you expose to the world.
you leave that site.
be fingerprinted: https://panopticlick.eff.org/
7
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
encrypted tunnel to some proxy in the Internet, which in turn forwards your traffic to its intended destination.
Anonymouse.org, etc, etc...
that they will not sell your information to third-parties.
services?
8
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
eventually forwarded in a mix.
9
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
10
File
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
11
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
12
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
13
File
circID = 100 circID = 867 circID = 5309
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
keys to return such information.
knowing the ID of the previous hop (circID), encrypts the message.
corresponding circID for the next hop, encrypts and forwards.
packet.
14
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
identities revealed.
registered services.
15
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
world.
diverse route, but that you can also rely on servers in other countries if yours outlaws Tor.
if it is illegal, these nodes are already blocked.
16
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
delay of packets makes it susceptible to timing attacks.
add fingerprints to flows by changing the inter-packet timing.
17
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
Silk Road was taken down.
deanonymized himself, leading to his ID and arrest.
taken down by law enforcement worldwide.
Security?
18
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
heads, it forwards the message to another random node. If tails, it sends the message to the final destination.
19
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
high throughput.
verifiable guarantees.
20
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
21
Alice Bob Charles
FlipA,B = 1 FlipA,C = 0 FlipB,C = 1
NSA Alice:A,B ⊕ A,C = 1 ⊕ 0 = 1 Bob: A,B ⊕ B,C = 1 ⊕ 1 = 0 Charles: A,C⊕ B,C = 0 ⊕ 1 = 1 A⊕B⊕C=0 Bob Alice:A,B ⊕ A,C = 1 ⊕ 0 = 1 Bob: A,B ⊕ B,C = ¬ (1 ⊕ 1) = 1 Charles: A,C⊕ B,C = 0 ⊕ 1 = 1 A⊕B⊕C=1
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
multicast network topologies.
Retrieval (PIR) to hide their queries.
Evaluation (SFE)
22
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
demonstrate that these systems provide certain properties.
practical speed), but operations are far too heavy for SSH, HTTP and VoIP .
23
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
communications “indistinguishable” from noise.
techniques make this (and many other properties) possible in electronic voting systems.
with similar features (e.g., eCash, BitCoin) are being investigated.
24
Southeastern Security for Enterprise and Infrastructure (SENSEI) Center
confidentiality.
down into two generally classes of solutions: Mixes and DC-nets
guarantees.
facing them. Nothing yet provides us with everything that we need!
25