Presentation is loading. Please wait.

Presentation is loading. Please wait.

Free-route Mixes vs. Cascades

Similar presentations


Presentation on theme: "Free-route Mixes vs. Cascades"— Presentation transcript:

1 Free-route Mixes vs. Cascades
R. Newman

2 Topics Defining anonymity Need for anonymity Defining privacy
Threats to anonymity and privacy Mechanisms to provide anonymity Applications of anonymity technology

3 Free-Route Mix Network
Sender picks route Mix only sees predecessor, successor Attacker – global adversary Passive – eavesdrop only Active – delay, delete, modify, fabricate msgs Claim: One honest Mix gives anonymity Anonymity measure: Anonymity set size Measure used is log2 (AS(m)) AS(m) is Anonymity Set for message m

4 Free-Route Mix Network
OK, One honest Mix works... When? For passive global adversary Sort of.... What does attacker still know? What about participants? Suppose attacker controls all but one sender... No anonymity!!! Unless.... How do dummy messages help? Big challenge to prevent n-1 attack Seems to require registration....

5 Free-Route Mix Network
Suppose threshold is N = 2 M2 M4 M1 M3

6 Free-Route Mix Network
Attacker controls n-1 of n senders M2 M4 M1 M3

7 Free-Route Mix Network
Attacker controls n-1 of n senders Attacker knows routes it selected! M2 M4 M1 M3

8 Mix Cascade Single chain of Mixes for a sender group
All traffic enters first Mix M1 in cascade All traffic is shuffled and re-encrypted All traffic is sent from Mi to Mi+1 in cascade All traffic exits last Mix to destinations M1 M2 M3 M4

9 Anonymity Set Relative to a message m All possible senders of m
If Mix M that forwards m is honest AS(m) = Union of AS(m’) for all m’ input to M If Mix that forwards m is corrupt AS(m) = AS(m’) for input message m’ linked to m

10 Anonymity Set Suppose threshold is N = 3 M1 |AS| = 3

11 Anonymity Set Suppose threshold is N = 3 M1 |AS| = 3
m = msg of interest |AS| = 3 M3 |AS| = 3

12 Anonymity Set Suppose threshold is N = 3 And suppose M3 is corrupt M1
|AS| = 3 |AS| = 7 = M2 M4 |AS| = 3 M3 |AS| = 1

13 Mix Cascade AS Anonymity Set for cascade is all senders M1 M2 M3 M4

14 Mix Cascade AS Anonymity Set for cascade is all senders
Even if all but one Mix is corrupt M1 M2 M3 M4

15 Intersection Attack If sequence of messages <mi> = m1, m2,... mn are linked All go to same destination in short time period Each message has an associated anonymity set ASi =AS(mi) The sender of the messages must be in ASi for all i Hence, AS(<mi>) = intersection(ASi) If for some i <> j, ASi <> ASi then AS shrinks

16 Intersection Attack Suppose threshold is N = 2 M2 M4 M1 M3

17 Intersection Attack Suppose threshold is N = 2 M2 M4 M1 M3

18 Intersection Attack Suppose threshold is N = 2 M2 M4 M1 M3

19 Intersection Attack Suppose threshold is N = 2 M2 M4 M1 M3

20 Intersection Attack Some senders are NOT possible! M2 M4 M1 M3

21 Intersection Attack Suppose later, link another message to first M2 M4

22 Intersection Attack Suppose later, link another message to first M2 M4

23 Intersection Attack Suppose later, link another message to first M2 M4

24 Intersection Attack Now even fewer senders are possible! M2 M4 M1 M3

25 Intersection Attack Suppose yet another message is linked M2 M4 M1 M3

26 Intersection Attack Suppose yet another message is linked M2 M4 M1 M3

27 Intersection Attack Suppose yet another message is linked M2 M4 M1 M3

28 Intersection Attack Suppose yet another message is linked M2 M4 M1 M3

29 Intersection Attack Now the AS size is one – no anonymity! M2 M4 M1 M3

30 Path Length In a free-route mix network, routing information must be included in the messages Not so in cascade – all take same route This limits the maximum path length If the senders all use the maximum path length allowed, then for a given message m, ... Senders for shorter paths are excluded Senders for longer paths are excluded This reduces the AS size for that message

31 Free-Route Mix Network
Suppose path length = 2 M2 M4 M1 M3

32 Free-Route Mix Network
Suppose path length = 2 M2 M4 M1 M3

33 Free-Route Mix Network
Suppose path length = 2 M2 M4 M1 M3

34 Free-Route Mix Network
This message can’t be the one – path would be too long! M2 M4 M1 M3

35 Free-Route Mix Network
This message can’t be the one – path would be too long! So a sender is eliminated from AS(m) M2 M4 M1 M3

36 Honest Mix Position If attacker controls all but one Mix
Attacker can tell where honest Mix is on route Can then reduce possible sources or destinations based on route length What is probability that honest Mix is even selected at all for a message’s route? If multiple messages are sent, do they follow same route or different routes? If same => more powerful intersection attack? If different => less likely to always pick honest Mix


Download ppt "Free-route Mixes vs. Cascades"

Similar presentations


Ads by Google