Font Size: a A A

Research On Security And Authentication Techniques Of Anonymous Network Connection

Posted on:2002-12-08Degree:DoctorType:Dissertation
Country:ChinaCandidate:F X ZhaoFull Text:PDF
GTID:1118360095451194Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Anonymous application, which has first been introduced by David Chaum from defining a mechanism for routing data through intermediate nodes, called mixes, in 1980s, works in various ways, such as anonymous connections, private web browsing, mobile agents and anonymity controlled electronic payment systems in the Internet, and such as Anonymous Communications, Anonymous Cash, Anonymous Elections, Anonymous Auctions, Anonymous Computations, Anonymous Transactions & Systems, and distributed information storage and anonymous publishing in the other fields. Anonymous network connections are applied in network layer by means of some anonymous techniques. With the introduction of services sensitive to security into in network, including in electronic commerce, in government affairs, in military communications, not only should the content of a conversation be protected from eavesdroppers by encryption integrated into many secure systems but also the identities of communicating parties and network entities should be hided from exposing to eavesdroppers, or from each other. The aim of anonymous connections in the network described here are designed to be resistant to traffic analysis and the anonymous applications should be implemented with the primitives for building anonymous connections. Although onionrouting and mobile agents are used as the important primitives, there are several severedrawbacks in the current schemes. Firstly, Onion Routing schemes available can hideinformation but can not prevent attacker from subversive attacks such as disturbing data packages, that is, the attacker do not want to know the contents of message being sent but make them confusion, which is fragile. Secondly, this standard use of public key cryptographic techniques for anonymous routing will reduce the whole network efficiency because their expensive computations disagree with the routing protocol. Thirdly, for any anonymous connection, a sequence of anonymous router in a route is strictly defined at connection setup and anonymous routing provides dynamic, bi-directional and near real time similar to TCP/IP sockets connections. Fourthly, mobile agents consist of software only that cannot prevent malicious hosts from spying at their secure key used in signature and encryption when they are executing their programs on the remote computers. Protecting mobile agents from malicious hosts is clearly a hard program. Fifthly, mobile agents areautonomous programs, which, following a route, migrate through a network of sites to accomplish tasks on behalf of their owners, Not only protecting their secure keys but also safeguard an agent's route information that are strongly resistant to both eavesdropping and traffic analysis. Lastly, an agent's data collected on some host along the route should be kept secret to other hosts and they should be resistant to be both eavesdropped and tampered when they roam the network. They have not been mentioned, or there do not exist any a full and efficient solution in the literature available. Based on a detailed summarization and analysis of related literatures, in this thesis, a further research on in the literature available is done aiming at the drawbacks presented above, and the following results are gotten:1. With respect to anonymous network connection schemes, an authenticated scheme of onion routing is present. This eliminates the defect that the protocols available cannot be resistant to active attacks to improve services supported by anonymous network connections2. The authenticated onion routing protocol based on signcryption for third-party verification is first presented on the basis of making a summary of the current information authentication. In the case the protocol can operate efficiently without access to the plaintext of the routing packet.3. An onion routing packet by means of the source routing protocol during building an anonymous conn...
Keywords/Search Tags:Information Security, Anonymous Application, Information Authentication, Network Security, Anonymous Network connection, Onion Routing, Signcrytion, Electronic Payment
PDF Full Text Request
Related items