slicing the licing the onion onion
play

Slicing the licing the Onion: Onion: Anonymity Without PKI - PowerPoint PPT Presentation

Slicing the licing the Onion: Onion: Anonymity Without PKI Anonymity Without PKI Sachin Katti Dina Katabi & Katya Puchala State of the art: Onio Onion Rout n Routing over P2P ing over P2P n Routing over P2P ing over P2P Bob Onion


  1. Slicing the licing the Onion: Onion: Anonymity Without PKI Anonymity Without PKI Sachin Katti Dina Katabi & Katya Puchala

  2. State of the art: Onio Onion Rout n Routing over P2P ing over P2P

  3. n Routing over P2P ing over P2P Bob Onion Rout Onio State of the art: Alice

  4. ing over P2P n Routing over P2P Bob Encr ypt packet s in layer s Onion Rout Onio State of the art: Alice

  5. n Routing over P2P ing over P2P Bob Onion Rout Onio State of the art: Alice

  6. State of the art: Onio Onion Rout n Routing over P2P ing over P2P Alice Bob • Each node only knows its previous hop and next hop • Bob does not know the identity of Alice either

  7. Bob catch? tch? Centralized trusted PKI the ca What’s the Wha Alice

  8. PK PKI Sho I Showst stopp oppers rs! • Key distribution • Key updates • Compulsion attacks • Trust model Can we Ca we ha have ve an anon onymit ymity y Can we Ca we ha have ve an anon onymit ymity y without PKI? without PKI? without PKI? without PKI?

  9. This This ta talk… Ho How to d w to do anonym onymous ous co communica mmunicati tion w on with thou out t PKI

  10. What What kin kind of an of anonymity? onymity? • Message confidentiality • Source anonymity • Destination anonymity

  11. Confidentia nfidentiality witho y without PKI t PKI Sour ce split s message M M int o t wo par t s M 1 M 2 Source Destination Source sends M 1 and M 2 along node disj oint pat hs

  12. Confi nfiden entia tiality wi y withou thout t PKI Message “Lets meet at 5 pm” “Lets meet” Split into two “at 5 pm” A 1 A 2 “Lets meet” A Randomize them! “at 5 pm” “aaspdgf qw” Random slices “asdlf rwe”

  13. Confi nfiden entia tiality wi y withou thout t PKI A 1 “ aaspdgfqw” A 2 “ asdlfrwe” Source Destination Reconstruct original information from the slices

  14. Confi nfiden entia tiality wi y withou thout t PKI A 1 “aaspdgf qw ” Received random slices A 2 “asdlf rwe” - 1 “aaspdgf qw” Matrix inversion A 1 A 2 “asdlf rwe” “Lets meet” Original pieces of “at 5 pm” message “Lets meet at 5 pm” Original message

  15. What about What about anonymity? anonymity? Id Idea : B : Build an anon onym ymit ity fro from co confid iden entialit lity

  16. What about What about anonymity? anonymity? Idea : B Id : Build an anon onym ymit ity fro from co confid iden entialit lity Source tells each relay the ID of its next hop in a confidential message

  17. Challenge Challenge Exponential Exponential b blowup! up! Exponential Exponential b blowup! up!

  18. Challenge Challenge : : Exponential Blowup xponential Blowup Solu lution : : No Node R de Reuse Solu lution : : No Node R de Reuse

  19. Il Illustra lustrati tive Examp ve Example S S’ Source has multiple I P addresses

  20. Source picks relays and organizes them in stages Y X ve Example tive Examp Z R lustrati Illustra W V Il S’ S

  21. Y X ve Example Destination is placed randomly tive Examp Z R lustrati Illustra W V Il S’ S

  22. Y X ve Example tive Examp R Z lustrati Illustra W V Il S’ S

  23. Illustra Il lustrati tive Examp ve Example S V Z X {Z 1 R 1 } {Z 2 R 2 } R Y S’ W V needs t o know Z and R

  24. Il Illustra lustrati tive Examp ve Example S V Z X {Z 1 R 1 } {Z 2 R 2 } R Y S’ W {Z 1 R 1 } V combines t he t wo {Z 2 R 2 } slices t o get it s next hops Z and R {Z R}

  25. Y X ve Example tive Examp R Z lustrati Illustra W V Il S’ S

  26. Il Illustra lustrati tive Examp ve Example S V Z X {Y 1 X 1 } {Y 1 X 1 } {Y 2 X 2 } {Y 2 X 2 } R Y S’ W R can combine incoming slices t o get X and Y R needs t o know X and Y

  27. Il Illustra lustrati tive Examp ve Example S V Z X R Y S’ W Node disj oint pat hs t o R

  28. Il Illustra lustrati tive Examp ve Example S V Z X R Y S’ W Node disj oint pat hs t o Y

  29. Il Illustra lustrati tive Examp ve Example S V Z X R Y S’ W Node V is reused t o const ruct disj oint pat hs t o R and Y

  30. Il Illustra lustrati tive Examp ve Example S V Z X {Z 1 R 1 } {Y 1 X 1 } {Z 1 R 1 } {Y 1 X 1 } { Z R 2 } 2 {Z 1 R 1 }{Y 2 X 2 } {Y 2 X 2 } R Y S’ W Send slices in the same packet

  31. Il Illustra lustrati tive Examp ve Example S V Z X {Z 1 R 1 }{Y 1 X 1 }{ rnd 1 } {Y 1 X 1 }{rnd 1 } { rnd 1 } {Z 1 R 1 } } } X 2 2 d n Y 2 r { { {Y 1 X 1 } {rnd 1 } { Z R 2 } 2 {Z 1 R 1 }{Y 2 X 2 }{rnd 2 } {Y 2 X 2 }{ rnd 2 } { rnd 2 } R Y S’ W Small number of nodes

  32. Slicin Slicing Protoc g Protocol ol • Parameters – No. of stages ! L – Splitting factor ! d • Information for each relay I – Next hop IP addresses – Receiver flag – Symmetric session key (no PKI problems)

  33. Slicin Slicing Protoc g Protocol ol • Source picks L*d relays including the receiver • Relays are organized into L stages of d nodes each • For each relay source computes I • Source divides each I into d random slices (I 1 ,… … , I d )

  34. Slicin Slicing Protoc g Protocol ol • Relay X has to get the d slices (I x1 ,… … , I xd ) S V Z X (I x1 ,I x2 ) S’ W R Y

  35. Slicin Slicing Protoc g Protocol ol • For each stage prior to X divide the d slices randomly between the d nodes in that stage S V Z X (I x1 ,I x2 ) (I x1 ) (I x1 ) (I x2 ) (I x2 ) (I x1 ) (I x2 ) S’ W R Y

  36. Slicin Slicing Protoc g Protocol ol • Slices are following node disjoint paths (I X1 ) (I X2 ) S V Z X (I X1 ,I X2 ) (I X1 ) (I X1 ) (I X2 ) (I X2 ) (I X1 ) (I X2 ) S’ W R Y

  37. Slicin Slicing Protoc g Protocol ol • Slices are following node disjoint paths (I Y1 ) (I Y2 ) S V Z X (I X1 I Y1 ) (I X1 I Y2 ) (I X1 ,I X2 ) (I X2 I Y1 ) (I Y1 ,I Y2 ) (I X1 I Y2 ) (I X2 I Y2 ) (I X2 I Y1 ) S’ W R Y

  38. Slicin Slicing Protoc g Protocol ol • Source organizes L*d relays into L stages of d nodes • Source divides node information I into d random slices (I 1 ,… … , I d ) • Relay X gets the d random slices (I x1 ,… … , I xd ) • If X is in stage k – Source goes to stages k-1 to 1 – Assigns the d slices of node X randomly to the d nodes in that stage

  39. Slicin Slicing Protoc g Protocol ol - Decodin ecoding • Node uses the d slices from its parents to decode its information I x1 I P addresses of decoding I x next hops r econst r uct Receiver Flag X Symmet ric Key I xd

  40. Slicing Protocol licing Protocol – Data ata Transmission Transmission • Each node in the graph has a symmetric key assigned by the source • Source uses normal onion routing to transmit data

  41. Why Why this is is is ex exci citing? ng? • No PKI ! Truly distributed P2P anonymous overlays • Scales to large number of nodes • Simple matrix multiplications ! Efficient anonymity Prac actical anonymity tical anonymity Prac actical anonymity tical anonymity

  42. What we are doing… What we are doing… • Resilience to node churn • Anonymity similar to Chaum mixes (i.e., onion routing) • Resilience to traffic analysis attacks • Implementing it on Planetlab

  43. To To c conc nclude… Fundamentally new way to provide anonymity that does not need PKI

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend