Sunteți pe pagina 1din 18

Group Members

o Muhammad Shabbir Ali


o Muhammad Shahzad
o Shahryar Abbasi
What is
T R?
Introduction
 The Onion Rooter (TOR) is a toolset for a wide range of
organizations and people that want to improve their
safety and security on the Internet.

 TOR can help you anonymize web browsing and


publishing, instant messaging and other applications.

 It also enables software developers to create new


communication tools with built-in privacy features.
History of TOR
 The core principle of Tor, “Onion Routing”, was developed in
the mid-1990s.

 It was developed by United States Naval Research Laboratory


employees, Mathematician Paul Syverson, and computer
scientist Michael G. Read and David Goldschlag, with the
purpose of protecting U.S. intelligence communications
online.
Components of TOR

Exit
OR3

Entry
OR1

Middle Client or Server


OR2
Onion Router

Directory Server
Objective of Onion Routing
 The purpose of Onion Routing is to protect the anonymity of
a user who wants to communicate over a network. It will hide
the destinations of all communications initiated by the user.

 Onion Routing aims to defend against “Traffic Analysis” a


form of network surveillance that threatens personal
anonymity and privacy, confidential business activities and
relationships, and state security.
How Onion Routing Works
 Onion Routing instead of making a connection directly to a
destination machine, builds an anonymous connection (route)
through several other Onion Rooters to the destination. Each
Onion Router can only identify adjacent Onion Routers along
the route.

 Before sending data over an anonymous connection, Onion


Router first makes an Onion. An onion is a special data structure
where the actual data to be travelled on the network is placed at
its center and different encrypted layers are surrounded by it.
How TOR Works?
Alice

Step 1: Alice’s Tor


Jane
client obtains a list
of Tor nodes from a
directory server.

Bob
Dave
How TOR Works?
Alice

Step 2: Alice’s Tor client picks


a random path to destination Jane
server. Green Links are
encrypted, Red Links are in
the clear.

Bob
Dave
How TOR Works?
Alice

Step 3: If the user wants


access to another site, Alice’s
Jane
Tor client selects a second
random path. Again, Green
Links are encrypted, Red
Links are in the clear.

Bob
Dave
Advance Implementation
of Onion Router
 TOR is currently the most advanced implementation of
Onion Routing in us today. TOR is currently deployed on
the Internet. TOR design is actually based on the Onion
Routing design & its concepts.
Users of TOR
 Individuals use TOR to keep websites from tracking them and their
family members, or to connect to news sites, instant messaging
services. TOR’s “Hidden Service” let users publish websites and
other services without needing to reveal the location of the site.

 NGO’s use TOR to allow their workers to connect to their home


website while they are in foreign country, without notifying
everybody nearby that they’re working with that organization.
Uses of TOR

 A branch of a U.S. Navy uses TOR for open source


intelligence gathering, and open of its teams used TOR while
deployed in the Middle East recently.

 Law enforcement uses TOR for visiting or surveilling


websites without leaving government IP addresses in their
web logs.
Conclusion
 TOR becomes most widely used anonymous network with its speed.

 TOR supports mutual anonymity with the help of Rendezvous Point.

 TOR resists local adversary effectively.

 TOR anonymizes TCP streams, providing a high-throughput and


low-latency network compared to the onion routing.

S-ar putea să vă placă și