Questions tagged [onion-routing]

A method for anonymous communications over a wide area network such as the Internet.

A method for anonymous communications over a wide area network such as the Internet.

Onion routing hides the names of the parties that are communicating as well as the data by encrypting the payload in layers, with a different encryption layer for each hop in the route. Using cooperating proxy routers throughout the network, the initiating onion router, called a "Tor client" in the Tor (The Onion Router) system, determines the path and encrypts the layers using the different public keys of each router. It also encrypts the destination for the next hop in each layer. Each router decrypts the payload with its private key, "unpeeling" the message like an onion and sending the data to the next router after the next hop is decrypted and revealed.

8 questions
7
votes
2 answers

Difference between mix networks and onion routing

From what I know, the two seems to be the same: Onion routing: Encryption is done in layers. Alice and server1 exchanges keys and she encrypts her message. Then, Alice and server2 exchanges keys and she encrypts again, creating layers of encryption.…
user153882
  • 507
  • 7
  • 18
4
votes
4 answers

Can cryptography be used to hide routing information from the router?

If Alice wants to talk to Bob and she has to involve a third party system run by Carol to establish, and possibly maintain, communications, then Carol knows that Alice and Bob communicated with each other. Chuck sneaks into Carol's exchange, and now…
Adam Davis
  • 191
  • 1
  • 6
3
votes
1 answer

openssh ed2215 private key format

i have generated an ed2215 private key as follows: $ ssh-keygen -o -a 100 -t ed25519 -f id_ed25519 and it looks like -----BEGIN OPENSSH PRIVATE KEY----- ... -----END OPENSSH PRIVATE KEY----- where ... is truncated data. although it feels like…
Mr.
  • 143
  • 1
  • 5
2
votes
0 answers

Padding mechanism used in onion routing

I would like to get a correct understanding of the padding mechanism used in onion routing. The following is taken from the original paper of onion routing[https://www.onion-router.net/Publications/IH-1996.pdf]. Notice that at each hop the onion…
Sangjin Kim
  • 161
  • 2
2
votes
0 answers

Tor Key Exchange Client - Middle Node

I am currently exploring the workings of the Tor network, specifically how the Diffie-Hellman (DH) key exchange protocol is employed to establish shared secret keys between the client and each relay in the circuit. In this lesson from Nick Mathewson…
Elian
  • 21
  • 2
2
votes
1 answer

Who's talking to who encryption - does this concept work?

With all the NSA stuff in the news, I've been thinking about how to ensure the "who's talking to who" is just as private as the contents of the messages. I had an idea on the subject, about which I've got two questions: the first, does this concept…
user8676
  • 21
  • 2
1
vote
1 answer

Tor's integrity verification system?

I am trying to understand the design of Tor(onion router). I am reading the original paper on the 2nd generation onion routing system. Where, under integrity checking on streams, they say, "When Alice negotiates a key with a new hop, they each…
wrv
  • 13
  • 2
0
votes
1 answer

Onion address encoding

Could you please explain what the pipe (|) in tor specification means -- is it a bitwise or or a concatenation of the values? Encoding onion addresses [ONIONADDRESS] The onion address of a hidden service includes its identity public key, a …
Mr.
  • 143
  • 1
  • 5