13. Anonymity protocols Flashcards

1
Q

What can encryption not hide on the internet?

A

Routing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is anonymity?

A

A user may user a service or resource without disclosing the users identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does 3DC stand for (protocol)?

A

Three-party dinning cryptographers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the 3DS protocol do?

A

Reveals if the NSA paid or one of the cryptographers (but not which cryptographer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the 3DS protocol?

A
  1. Each cryptographer flips a coin and shows it to left neighbour
  2. Each cryptographer announces if the two coins are same, (if the cryptographer pays he lies)
  3. odd number of same => NSA paid, even number of same => a cryptographer paid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What makes 3DS protocol impractical?

A
  • requires secure channels between participants to share coin flips
  • requires large amounts of randomness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the idea behind Crowds protocol?

A

Randomly route requests through a crowd of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does the Crowds protocol work?

A
  1. Initiator picks forwarded from crowd and sends request
  2. Forwarder sends request either to server or a new forwarder with some probability (and records request)
  3. Response follows same route
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Crowd protocol not resistant against?

A

An attacker which sees the whole network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Chaum’s work?

A
  1. Users send messages to a trusted mix server
  2. Messages are padded and buffered to prevent
  3. Dummy messages are generated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are messages buffered in Chaum’s Mix?

A

Avoid time correlation attack’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are dummy messages sent in Chaum’s mix?

A

If the attacker sends n - 1 messages to mix (with capacity n) he can link the sender of the nth message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you deal with the problem that some mixes may be corrupted in Chaum’s mix?

A

Send messages through a sequence of mixes, as long as a single mix is honest you have guaranteed anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the limitations of Chaum’s mix?

A
  • Asymmetrical encryption is not efficient
  • Dummy messages are inefficient
  • Buffering is inefficient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does onion routing not defend against?

A
  • Attacker that sees the whole network

- End to end timing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does onion routing work?

A
  1. Originator chooses a random chain of nodes
  2. Originator establishes secret key with entry node, then second node (relayed through entry), till exit node
  3. Once the chain is complete data can be sent anonymously by encrypting/decrypting with layers of secret keys
17
Q

How does an end-to-end timing attack work on Tor?

A

An attacker that controls the entry and exit node can delay a message, if the message was delayed at the exit node then they likely came from the client connecting to the entry node

18
Q

Why does the client not do DNS requests before onion routing?

A

Tor works over TCP, DNS is UDP so it would not be anonymous

19
Q

How does DNS work with Tor?

A

The exit node performs DNS on the address

20
Q

What are Tor onion services?

A

Services that can only be accessed via the Tor network, protecting the anonymity of the user and the server