Sciweavers

ACSW
2007

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

13 years 8 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model the adversary can only see part of the links in the system. In a recent paper entitled Low-cost traffic analysis of Tor, it was shown that a variant of timing attack that does not require a global adversary can be applied to Tor. More importantly, authors claimed that their attack would work on any low latency anonymous network systems. The implication of the attack is that all low latency anonymous networks will be vulnerable to this attack even if there is no global adversary. In this paper, we investigate this claim against other low latency anonymous networks, including Tarzan and Morphmix. Our results show that in contrast to the claim of the aforementioned paper, the attack may not be applicable in all cases. Based on our analysis, we draw design principles for secure low latency anonymous network system...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa
Added 29 Oct 2010
Updated 29 Oct 2010
Type Conference
Year 2007
Where ACSW
Authors Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
Comments (0)