On the Feasibility of a Censorship Resistant Decentralized Name - - PowerPoint PPT Presentation

on the feasibility of a censorship resistant
SMART_READER_LITE
LIVE PREVIEW

On the Feasibility of a Censorship Resistant Decentralized Name - - PowerPoint PPT Presentation

On the Feasibility of a Censorship Resistant Decentralized Name System Matthias Wachs Martin Schanzenbach Christian Grothoff Technische Universit at M unchen The Sixth International Symposium on Foundations & Practice of Security


slide-1
SLIDE 1

On the Feasibility of a Censorship Resistant Decentralized Name System

Matthias Wachs Martin Schanzenbach Christian Grothoff

Technische Universit¨ at M¨ unchen

The Sixth International Symposium on Foundations & Practice of Security FPS’2013 La Rochelle, France

1 / 12

slide-2
SLIDE 2

Where We Are

2 / 12

slide-3
SLIDE 3

Adversary Model

◮ Any role ◮ Multiple Identities ◮ Computational Power ◮ Legal Power

But cannot:

◮ Break or prevent crypto ◮ Attack user systems ◮ Prevent network communication

3 / 12

slide-4
SLIDE 4

Broken Pillars

Web Social Messaging Encryption T elephony Public Key Infrastructure

4 / 12

slide-5
SLIDE 5

Broken Pillars

Web Social Messaging Encryption T elephony Public Key Infrastructure

5 / 12

slide-6
SLIDE 6

Zooko’s Triangle

Secure Global Memorable

A name system can only fulfill two!

6 / 12

slide-7
SLIDE 7

Zooko’s Triangle

Secure Global Memorable Hierarchical Registration C r y p t

  • g

r a p h i c I d e n t i fi e r s Petname Systems

7 / 12

slide-8
SLIDE 8

Zooko’s Triangle

Secure Global Memorable Hierarchical Registration C r y p t

  • g

r a p h i c I d e n t i fi e r s Petname Systems

mnemonic URLs c e r t i fi c a t e s S D S I

8 / 12

slide-9
SLIDE 9

Petnames and SDSI

PUBAlice PUBCarol PUBBob bob carol bob's carol

9 / 12

slide-10
SLIDE 10

Requirements

◮ Censorship Resistance by Decentralization

⇒ Peer-to-Peer, DHT

◮ Verification

⇒ Signatures

◮ Query Privacy

⇒ Encryption

◮ Integration with DNS

⇒ Coexisting Namespaces

10 / 12

slide-11
SLIDE 11

Challenges

◮ Legacy Applications

⇒ Proxies

◮ Censorship in other Layers

⇒ Tor

◮ Usability

⇒ DNS look-a-like, QR Code

Bob Builder, Ph.D. Address: Country, Street Name 23 Phone: 555-12345 Mobile: 666-54321 Mail: bob@tum.gnu 11 / 12

slide-12
SLIDE 12

End

Thank you! schanzen@in.tum.de wachs@net.in.tum.de grothoff@net.in.tum.de Get the code: https://gnunet.org/gns

12 / 12