Version 1
: Received: 13 July 2023 / Approved: 13 July 2023 / Online: 14 July 2023 (07:05:43 CEST)
How to cite:
ghanem, M. C. Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints2023, 2023070982. https://doi.org/10.20944/preprints202307.0982.v1
ghanem, M. C. Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints 2023, 2023070982. https://doi.org/10.20944/preprints202307.0982.v1
ghanem, M. C. Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints2023, 2023070982. https://doi.org/10.20944/preprints202307.0982.v1
APA Style
ghanem, M. C. (2023). Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints. https://doi.org/10.20944/preprints202307.0982.v1
Chicago/Turabian Style
ghanem, M. C. 2023 "Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances" Preprints. https://doi.org/10.20944/preprints202307.0982.v1
Abstract
The Onion Route Network (also called TOR) is by far the most efficient and widely used anonymity platform with millions of users daily and an expanding size and capacities. Since its public deployment in 2002, the Onion Routing network (also known as TOR) has maintained its leading position and dozens of propositions aiming to improve its performance and enhance the security (anonymity and privacy) have been made. Given the significance of this research area, this work seek to contribute into the improvement of TOR by investigating and testing revolutionary cryptographic and routing mechanism. This work is justified by the current TOR vulnerability and observed weaknesses, and set the challenging aim of covering these security flaws by proposing the relevant security and performances improvement such as the authenticated-encryption for onion construction, the lightened onion encapsulation approach and the secured circuit selection and cell routing mechanisms. The obtained results from implementing the proposed improvements and testing them into a TOR-like simulation platform permit to validate not only, the performances and security contributions brought by the improvement, but also the suitability of their potential implementation into the real TOR network.
Computer Science and Mathematics, Computer Networks and Communications
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.