ebook img

Peer-to-Peer Systems and Security - Anonymity PDF

112 Pages·2013·2.77 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Peer-to-Peer Systems and Security - Anonymity

Peer-to-Peer Systems and Security Anonymity Christian Grothoff TechnischeUniversit¨atMu¨nchen May 16, 2013 “The problem with losing your anonymity is that you can never go back.” –Marla Maples Eve cannot read the data Alice and Bob are sending, but: (cid:73) Eve knows that Alice and Bob are communicating. (cid:73) Eve knows the amount of data they are sending and can observe patterns. ⇒ Patterns may even allow Eve to figure out the data Motivation Suppose Alice and Bob communicate using encryption. What can Eve still learn here? Motivation Suppose Alice and Bob communicate using encryption. What can Eve still learn here? Eve cannot read the data Alice and Bob are sending, but: (cid:73) Eve knows that Alice and Bob are communicating. (cid:73) Eve knows the amount of data they are sending and can observe patterns. ⇒ Patterns may even allow Eve to figure out the data Anonymity Definitions Merriam-Webster: 1. not named or identified: “an anonymous author”, “they wish to remain anonymous” 2. of unknown authorship or origin: “an anonymous tip” 3. lacking individuality, distinction, or recognizability: “the anonymous faces in the crowd”, “the gray anonymous streets” – William Styron EFF: “Instead of using their true names to communicate, (...) people choose to speak using pseudonyms (assumed names) or anonymously (no name at all).” Mine: A user’s action is anonymous if the adversary cannot link the action to the user’s identity Anonymity Definitions Andreas Pfitzmann et. al.: “Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.” Mine: A user’s action is anonymous if the adversary cannot link the action to the user’s identity Anonymity Definitions Andreas Pfitzmann et. al.: “Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.” EFF: “Instead of using their true names to communicate, (...) people choose to speak using pseudonyms (assumed names) or anonymously (no name at all).” Anonymity Definitions Andreas Pfitzmann et. al.: “Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.” EFF: “Instead of using their true names to communicate, (...) people choose to speak using pseudonyms (assumed names) or anonymously (no name at all).” Mine: A user’s action is anonymous if the adversary cannot link the action to the user’s identity The user’s identity includes personally identifiable information, such as: (cid:73) real name (cid:73) fingerprint (cid:73) passport number (cid:73) IP address (cid:73) MAC address (cid:73) login name (cid:73) ... Actions include: (cid:73) Internet access (cid:73) speach (cid:73) participation in demonstration (cid:73) purchase in a store (cid:73) walking across the street (cid:73) ... Anonymity: Terminology (cid:73) Sender Anonymity: The initiator of a message is anonymous. However, there may be a path back to the initiator. ? (cid:73) Receiver Anonymity: The receiver of a message is anonymous. ?

Description:
May 16, 2013 Use a hybrid approach for flodding: ▷ Initiator picks random 20-byte SHA1 hash value. ▷ Each hop re-hashes the current value. ▷ If last bytes
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.