Timestamp /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K - - PowerPoint PPT Presentation

timestamp 16 at lbl sampled 1 in 1k 2nd 16 sampled 1 in
SMART_READER_LITE
LIVE PREVIEW

Timestamp /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K - - PowerPoint PPT Presentation

Timestamp /16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K Number of relays 8000 6000 Relays 4000 Bridges 2000 0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 The Tor Project https://metrics.torproject.org/ Directly


slide-1
SLIDE 1

Timestamp

slide-2
SLIDE 2

/16 at LBL, sampled 1-in-1K 2nd /16, sampled 1-in-1K

slide-3
SLIDE 3

2000 4000 6000 8000 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017

The Tor Project − https://metrics.torproject.org/

Relays Bridges

Number of relays

slide-4
SLIDE 4
slide-5
SLIDE 5

2 000 000 4 000 000 6 000 000 2012 2013 2014 2015 2016 2017

The Tor Project − https://metrics.torproject.org/

Directly connecting users

slide-6
SLIDE 6

50 100 150 200 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017

The Tor Project − https://metrics.torproject.org/ Bandwidth (Gbit/s)

Advertised bandwidth Bandwidth history

Total relay bandwidth

slide-7
SLIDE 7

10 20 30 2010 2011 2012 2013 2014 2015 2016 2017

The Tor Project − https://metrics.torproject.org/

Measured times on all sources per day Median 1st to 3rd quartile

Time in seconds to complete 50 KiB request

slide-8
SLIDE 8

(from 2008)

slide-9
SLIDE 9

2000 4000 6000 8000 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017

The Tor Project − https://metrics.torproject.org/

Relay flags Running Exit

Number of relays with relay flags assigned

slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14

Well-known: g, p Secret: x, y A⟶E⟶B: gx mod p B⟶E⟶A: gy mod p Derived key: gxy

Diffie-Hellman Exchange

slide-15
SLIDE 15

Well-known: g, p Secret: x, y A⟶M⟶B: EB(gx mod p) B⟶M⟶A: gy mod p, Hash(K=gxy) Derived key: gxy

Tor DHE

slide-16
SLIDE 16

Well-known: g, p Secret: x, y A⟶M: EB(gx mod p) M⟶B: EB(gx' mod p) B⟶M: gy mod p, Hash(K=gx'y) M⟶A: gy' mod p, Hash(K=g?) Derived key: gxy ? gx'y ? gxy' ? gx'y' ?

Tor DHE: Mallory Attacks?

slide-17
SLIDE 17

Well-known: g, p Secret: x, y; x' = y' = 0 A⟶M: EB(gx mod p) M⟶B: EB(gx' mod p) = EB(g0 mod p) = EB(1 mod p) B⟶M: gy mod p, Hash(K=gx'y) = Hash(g0) = Hash(1) M⟶A: gy' mod p = 1 mod p, Hash(K=1) Derived key: gxy ? gx'y = gxy’ = gx'y’ = 1

Tor DHE: Mallory Attacks!

slide-18
SLIDE 18

Well-known: g, p Secret: x, y A⟶M⟶B: EB(gx mod p) B⟶M⟶A: gy mod p, Hash(gx || gy || K=gxy) Derived key: gxy

Tor DHE Fixed

slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24