Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances

Version 1 : Received: 13 July 2023 / Approved: 13 July 2023 / Online: 14 July 2023 (07:05:43 CEST)

How to cite: ghanem, M.C. Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints 2023, 2023070982. https://doi.org/10.20944/preprints202307.0982.v1 ghanem, M.C. Cryptographically Upgrading TOR Network to Enforce Anonymity by Enhancing Security and Improving Performances. Preprints 2023, 2023070982. https://doi.org/10.20944/preprints202307.0982.v1

Abstract

The Onion Route Network (also called TOR) is by far the most efficient and widely used anonymity platform with millions of users daily and an expanding size and capacities. Since its public deployment in 2002, the Onion Routing network (also known as TOR) has maintained its leading position and dozens of propositions aiming to improve its performance and enhance the security (anonymity and privacy) have been made. Given the significance of this research area, this work seek to contribute into the improvement of TOR by investigating and testing revolutionary cryptographic and routing mechanism. This work is justified by the current TOR vulnerability and observed weaknesses, and set the challenging aim of covering these security flaws by proposing the relevant security and performances improvement such as the authenticated-encryption for onion construction, the lightened onion encapsulation approach and the secured circuit selection and cell routing mechanisms. The obtained results from implementing the proposed improvements and testing them into a TOR-like simulation platform permit to validate not only, the performances and security contributions brought by the improvement, but also the suitability of their potential implementation into the real TOR network.

Keywords

TOR; Online Anonymity; Onion Routing; Multi-layer encryption; authenticated- encryption; ExperimenTOR; JAVA Crypto; Circuit Construction; Routing protocols; Cell Encapsulation; AES; OCB

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.