Authorisation
Providing anonimity using Tor and risks of deanonimization
Author: ARCHIL KALANDADZEKeywords: anonymity, encryption, Tor, Onion Routing
Annotation:
The main goal of encrypted networks is to create such paths in Internet, that ensures anonymity of message’s sender. Tor application uses method called “Onion Routing” for encrypting messages. The name of this technique is based on several layers of encryption applied to outgoing message from a sender to a receiver. Computer that establishes connection and creates path, encrypts its message with several layers of encryption which then are peeled off by Onion Routers. Tor intends to stay as the best low latency anonymity service among many similar applications. The first version of Tor was created in 1996.Latest, 3rd version of Tor is still under constant development and was created in 2006. In this thesis we discuss how Tor has evolved, what kind of attacks exist against it and what sort of defences have been developed against them. We will review theoretical attacks on Tor which break anonymity and try to categorise them. In addition, To assess effectiveness of implementation, a series of tests will be conducted with the help of an existing web application. The web application will check Tor application’s behavior by conducting test in a various potential vurnelable parts. The results from the evaluation are going to be guide for the users and will help them stay anonymous while using the Internet.
Lecture files:
სამაგისტრო ნაშრომი [ka]