timestamp 16 at lbl sampled 1 in 1k 2nd 16 sampled 1 in
play

Timestamp /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K - PowerPoint PPT Presentation

Timestamp /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K Number of relays 8000 6000 Relays 4000 Bridges 2000 0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project https://metrics.torproject.org/ Directly


  1. Timestamp

  2. /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K

  3. Number of relays 8000 6000 Relays 4000 Bridges 2000 0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project − https://metrics.torproject.org/

  4. Directly connecting users 6 000 000 4 000 000 2 000 000 0 2012 2013 2014 2015 2016 2017 The Tor Project − https://metrics.torproject.org/

  5. Total relay bandwidth Advertised bandwidth Bandwidth history 200 150 Bandwidth (Gbit/s) 100 50 0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project − https://metrics.torproject.org/

  6. Time in seconds to complete 50 KiB request Measured times on all sources per day Median 1st to 3rd quartile 30 20 10 0 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project − https://metrics.torproject.org/

  7. (from 2008)

  8. Number of relays with relay flags assigned 8000 6000 Relay flags Running 4000 Exit 2000 0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project − https://metrics.torproject.org/

  9. Diffie-Hellman Exchange Well-known: g, p Secret: x, y A ⟶ E ⟶ B: g x mod p B ⟶ E ⟶ A: g y mod p Derived key: g xy

  10. Tor DHE Well-known: g, p Secret: x, y A ⟶ M ⟶ B: E B (g x mod p) B ⟶ M ⟶ A: g y mod p, Hash(K=g xy ) Derived key: g xy

  11. Tor DHE: Mallory Attacks? Well-known: g, p Secret: x, y A ⟶ M: E B (g x mod p) M ⟶ B: E B (g x' mod p) B ⟶ M: g y mod p, Hash(K=g x'y ) M ⟶ A: g y' mod p, Hash(K=g ? ) Derived key: g xy ? g x'y ? g xy' ? g x'y' ?

  12. Tor DHE: Mallory Attacks! Well-known: g, p Secret: x, y; x' = y' = 0 A ⟶ M: E B (g x mod p) M ⟶ B: E B (g x' mod p) = E B (g 0 mod p) = E B (1 mod p) B ⟶ M: g y mod p, Hash(K=g x'y ) = Hash(g 0 ) = Hash(1) M ⟶ A: g y' mod p = 1 mod p, Hash(K=1) Derived key: g xy ? g x'y = g xy’ = g x'y’ = 1

  13. Tor DHE Fixed Well-known: g, p Secret: x, y A ⟶ M ⟶ B: E B (g x mod p) B ⟶ M ⟶ A: g y mod p, Hash(g x || g y || K=g xy ) Derived key: g xy

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend