SlideShare a Scribd company logo
Onion Protocol
Anshu Raj
Table of Contents
 Overview
 Anonymity and its need
 Need for anonymous routing
 What is Onion Routing
 Implementation as TOR
 How TOR works?
 TOR Browser
 Conclusion
 References
Overview
 Onion protocol also known as Onion Routing is a technique for anonymous
communication over a computer network.
 Onion routing was developed in the mid-1990s at the U.S. Naval Research to
protect U.S. intelligence communications online.
 It was further developed by the defence Advanced Research Projects Agency
(DARPA) and patented by the Navy in 1998.
 Currently it is best implemented as The Onion Routing project aka TOR
What is Anonymity?
 Anonymity is the state of being unidentifiable within a set of subjects.
 Hiding your activities among other’s activities is anonymous activity.
 On the internet you are not anonymous. Your IP address can be linked directly to
you.
 Your browsing is being tracked. Cookies, flash cookies, HTML5 storage, cache are
some of the techniques by which browser is being tracked known as browser
fingerprinting.
Need for anonymity
 To protect privacy and avoid tracking by advertising companies.
 Protection from prosecution. Not every country guarantees free speech.
 To prevent chilling-effects. It’s easier to voice unpopular or controversial opinions if
you are anonymous.
 ISP’s store communication records usually for several years. Law enforcement
agencies can subpoena these records even after years.
 Your activities on the web can be used to identify you by the unique websites you
use and type of links you click.
Need for anonymous routing
 Traditionally, the right to privacy of communications has been one of the natural
rights in most countries of the world.
 Unfortunately, no such regulations exist for the Internet. Even more worryingly,
there is a global trend towards organised logging of information pertaining to
individuals' activities online.
 Keeping a record of a person's activities online is a stone's throw away from
infringing on the natural right of that person to privacy.
 Therefore good ways are needed to protect the privacy of communications against
observers. And there comes onion routing.
What is Onion Routing?
 Onion routing is an anonymous communication technique over a computer
network.
 Messages are constantly encrypted and then sent through several network nodes
called onion routers which creates a circuit of nodes.
 Each onion router removes a layer of encryption with its symmetric key to reveal
routing instructions, and sends the message to the next router where this is
process is repeated.
 Thus the analogy “onion router”. This prevents these intermediary nodes from
knowing the origin, destination, and contents of the message.
Onion Routing
 The system consists of a number of machines, called onion routers . Routers
communicate with each other over TCP. Some routers can also serve as entry
funnels, they can accept connections from the clients of the network.
 Some routers can server as exit funnels, they can create TCP connections leaving
the network to the actual Internet services that are being accessed through the
Onion Routing network. Such services can be world wide web, e-mail, peer-to-peer
applications, etc.
 When a client application wishes to establish an anonymous connection to a server,
it first of all connects to an application proxy.
 An application proxy accepts protocol-specific connections from applications, and
converts them into a generic protocol. The packets are then forwarded to an onion
proxy.
Onion protocol
Onion Routing continued…
 The onion proxy creates a route over the onion network and then constructs a
special data structure, an onion.
 An onion is a multiply encrypted layered structure, with information about the
route through the network being spread across the layers. The onion is then passed
on to an entry funnel.
 When an entry funnel receives an onion, it decrypts it, which reveals a layer
containing information about the next hop in the route constructed by the onion
proxy. This layer is then stripped off and the onion is forwarded on to this next hop.
 Eventually, the onion reaches an exit funnel. The decrypted packet is identical to
the packet that was produced by the application proxy at the beginning of the
connection. This packet will then be sent to the destination TCP host.
Onion Router and Analogy
Tor, An Implementation of Onion Routing
 Tor is currently the most advanced implementation of Onion Routing in
use today. Tor is currently deployed on the Internet.
What is TOR?
 It was originally developed for primary purpose of protecting government
communications.
 Today, it is an open source software project used everyday for wide variety of
purposes by normal people, the military, journalists, law enforcement agencies and
activists.
 It is a distributed anonymous network. It reduce the risks of both simple and
sophisticated traffic analysis by distributing transactions over several places on the
Internet.
 Data packets on the Tor network take a random pathway through several relays.
 No observer at any single point can tell where the data came from or where it's
going.
TOR overview, deployment and statistics
 It introduces Hidden services. Servers which can only be accessed via the TOR
overlay.
 It is the largest, most well deployed anonymity preserving service on the internet. It
is publically available since 2002. It is continuous in development.
 Currently, ~5000 Tor relays are present around the world. All relays are run by
volunteers. It is suspected that some are controlled by intelligence agencies.
 TOR network can be accessed by using TOR browser.
How TOR works?
 Tor provides anonymity by bouncing your Internet traffic around a distributed
network of encrypted relays run by volunteers around the world.
How TOR works?
How TOR works?
Tor Browser
Tor Browser
Onion Address
 Onion addresses starts with .onion
 It is only accessible via a TOR network.
 onion is a pseudo-top-level domain host suffix designating an anonymous hidden
service reachable via the TOR network.
 Example of onion url is
 http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine
 http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
Conclusion
 Onion Routing protects the anonymity of a user and hide the destinations of all
communications initiated by the user.
 Any outside observers will not be able to tell whom the user is communicating with
and for how long.
 Onion Routing uses Public Key Encryption to put multiple layers of encryption
around the original data packet, thus creating an object called an onion.
 This onion will follow a specific route through the network, and at each route a
layer of encryption will be peeled off. Once the onion reaches its destination it will
have been reduced to the original data packet.
 When a router decrypts the onion using its private key it will only get the address
of the next router along the path. So no router will ever know the full path that is
travelled by the onion.
 Since no outside observer will be able to follow an onion while it is travelling
through the network, the communication is completely anonymous.
References
 http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/#1
 http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof-
explains/
 http://tor.eff.org/
 http://thehiddenwiki.org/
 https://www.deepdotweb.com/how-to-access-onion-sites/
THANK YOU
Any Queries?

More Related Content

PPT
Tor Presentation
PPTX
TOR NETWORK
PDF
Introduction to Tor
PPTX
Tor the onion router
PPTX
Xss attack
PPTX
Onion routing and tor: Fundamentals and Anonymity
PPTX
Basics of Denial of Service Attacks
PPTX
Tor Presentation
TOR NETWORK
Introduction to Tor
Tor the onion router
Xss attack
Onion routing and tor: Fundamentals and Anonymity
Basics of Denial of Service Attacks

What's hot (20)

PPTX
Malware & Anti-Malware
PPT
Ssl https
PPTX
DoS or DDoS attack
PPTX
Network scanning
PPTX
Packet sniffing
PPTX
Tor: The Second Generation Onion Router
PPTX
DDoS - Distributed Denial of Service
PPT
Proxy Server
PPTX
NMAP - The Network Scanner
PPT
Introduction to Web Application Penetration Testing
PPTX
Denial of service
PPSX
Intrusion detection system
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Cybersecurity and the DarkNet
PPTX
PPTX
Internetworking
PPTX
Introduction to Snort
PPTX
Packet sniffers
PPTX
Intrusion detection
 
PPTX
Cross-Site Scripting (XSS)
Malware & Anti-Malware
Ssl https
DoS or DDoS attack
Network scanning
Packet sniffing
Tor: The Second Generation Onion Router
DDoS - Distributed Denial of Service
Proxy Server
NMAP - The Network Scanner
Introduction to Web Application Penetration Testing
Denial of service
Intrusion detection system
The Deep Web, TOR Network and Internet Anonymity
Cybersecurity and the DarkNet
Internetworking
Introduction to Snort
Packet sniffers
Intrusion detection
 
Cross-Site Scripting (XSS)
Ad

Viewers also liked (17)

PDF
Anonymizing Networks
PPT
Anonymous Connections And Onion Routing
PPTX
Tor the onion router
PPTX
ONION Routing - Jovial learning
PPTX
The Onion Routing (TOR)
PPTX
How To Dice And Saute An Onion
PDF
Onion network architecture
PPTX
The End of Anonymity on Anonymous Networks
PPTX
Anonymous Security Scanning and Browsing
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPTX
Tor network seminar by 13504
PPTX
Tor Pivoting Networks Share
PPT
Onion
PDF
I2P and the Dark Web
PPTX
Introduction to anonymity network tor
PPTX
Ppt of routing protocols
Anonymizing Networks
Anonymous Connections And Onion Routing
Tor the onion router
ONION Routing - Jovial learning
The Onion Routing (TOR)
How To Dice And Saute An Onion
Onion network architecture
The End of Anonymity on Anonymous Networks
Anonymous Security Scanning and Browsing
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Tor network seminar by 13504
Tor Pivoting Networks Share
Onion
I2P and the Dark Web
Introduction to anonymity network tor
Ppt of routing protocols
Ad

Similar to Onion protocol (20)

PPT
Onion Routing.ppt
PPTX
Anonymous traffic network
PDF
Anonymity in the Web based on Routing Protocols
PDF
Anonymity in the web based on routing protocols
PPTX
Information security using onion routing(tor)
PDF
Tor project
PPTX
PDF
Control the tradeoff between performance and anonymity through end to-end t (2)
PPTX
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
PPTX
Tor browser
PPT
PDF
A framework for practical vulnerabilities of the tor (the onion routing) anon...
PDF
A framework for practical vulnerabilities of the tor (the onion routing) anon...
PDF
TOR-section,tails-os-dark_web, cybersecurity-slides.pdf
PPTX
Deep Web
PDF
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
PPTX
Anonymizers
PPTX
Acpe 2014 Internet Anonymity Using Tor
PDF
(130727) #fitalk anonymous network concepts and implementation
PDF
Why and How to use Onion Networking - #EMFCamp2018
Onion Routing.ppt
Anonymous traffic network
Anonymity in the Web based on Routing Protocols
Anonymity in the web based on routing protocols
Information security using onion routing(tor)
Tor project
Control the tradeoff between performance and anonymity through end to-end t (2)
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance...
Tor browser
A framework for practical vulnerabilities of the tor (the onion routing) anon...
A framework for practical vulnerabilities of the tor (the onion routing) anon...
TOR-section,tails-os-dark_web, cybersecurity-slides.pdf
Deep Web
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
Anonymizers
Acpe 2014 Internet Anonymity Using Tor
(130727) #fitalk anonymous network concepts and implementation
Why and How to use Onion Networking - #EMFCamp2018

Recently uploaded (20)

PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Testing WebRTC applications at scale.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Funds Management Learning Material for Beg
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Triggering QUIC, presented by Geoff Huston at IETF 123
Sims 4 Historia para lo sims 4 para jugar
presentation_pfe-universite-molay-seltan.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Unit-3 cyber security network security of internet system
Introuction about ICD -10 and ICD-11 PPT.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Testing WebRTC applications at scale.pdf
WebRTC in SignalWire - troubleshooting media negotiation
Funds Management Learning Material for Beg
Unit-1 introduction to cyber security discuss about how to secure a system
Design_with_Watersergyerge45hrbgre4top (1).ppt
SASE Traffic Flow - ZTNA Connector-1.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
The Internet -By the Numbers, Sri Lanka Edition
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Cloud-Scale Log Monitoring _ Datadog.pdf
Introuction about WHO-FIC in ICD-10.pptx

Onion protocol

  • 2. Table of Contents  Overview  Anonymity and its need  Need for anonymous routing  What is Onion Routing  Implementation as TOR  How TOR works?  TOR Browser  Conclusion  References
  • 3. Overview  Onion protocol also known as Onion Routing is a technique for anonymous communication over a computer network.  Onion routing was developed in the mid-1990s at the U.S. Naval Research to protect U.S. intelligence communications online.  It was further developed by the defence Advanced Research Projects Agency (DARPA) and patented by the Navy in 1998.  Currently it is best implemented as The Onion Routing project aka TOR
  • 4. What is Anonymity?  Anonymity is the state of being unidentifiable within a set of subjects.  Hiding your activities among other’s activities is anonymous activity.  On the internet you are not anonymous. Your IP address can be linked directly to you.  Your browsing is being tracked. Cookies, flash cookies, HTML5 storage, cache are some of the techniques by which browser is being tracked known as browser fingerprinting.
  • 5. Need for anonymity  To protect privacy and avoid tracking by advertising companies.  Protection from prosecution. Not every country guarantees free speech.  To prevent chilling-effects. It’s easier to voice unpopular or controversial opinions if you are anonymous.  ISP’s store communication records usually for several years. Law enforcement agencies can subpoena these records even after years.  Your activities on the web can be used to identify you by the unique websites you use and type of links you click.
  • 6. Need for anonymous routing  Traditionally, the right to privacy of communications has been one of the natural rights in most countries of the world.  Unfortunately, no such regulations exist for the Internet. Even more worryingly, there is a global trend towards organised logging of information pertaining to individuals' activities online.  Keeping a record of a person's activities online is a stone's throw away from infringing on the natural right of that person to privacy.  Therefore good ways are needed to protect the privacy of communications against observers. And there comes onion routing.
  • 7. What is Onion Routing?  Onion routing is an anonymous communication technique over a computer network.  Messages are constantly encrypted and then sent through several network nodes called onion routers which creates a circuit of nodes.  Each onion router removes a layer of encryption with its symmetric key to reveal routing instructions, and sends the message to the next router where this is process is repeated.  Thus the analogy “onion router”. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message.
  • 8. Onion Routing  The system consists of a number of machines, called onion routers . Routers communicate with each other over TCP. Some routers can also serve as entry funnels, they can accept connections from the clients of the network.  Some routers can server as exit funnels, they can create TCP connections leaving the network to the actual Internet services that are being accessed through the Onion Routing network. Such services can be world wide web, e-mail, peer-to-peer applications, etc.  When a client application wishes to establish an anonymous connection to a server, it first of all connects to an application proxy.  An application proxy accepts protocol-specific connections from applications, and converts them into a generic protocol. The packets are then forwarded to an onion proxy.
  • 10. Onion Routing continued…  The onion proxy creates a route over the onion network and then constructs a special data structure, an onion.  An onion is a multiply encrypted layered structure, with information about the route through the network being spread across the layers. The onion is then passed on to an entry funnel.  When an entry funnel receives an onion, it decrypts it, which reveals a layer containing information about the next hop in the route constructed by the onion proxy. This layer is then stripped off and the onion is forwarded on to this next hop.  Eventually, the onion reaches an exit funnel. The decrypted packet is identical to the packet that was produced by the application proxy at the beginning of the connection. This packet will then be sent to the destination TCP host.
  • 11. Onion Router and Analogy
  • 12. Tor, An Implementation of Onion Routing  Tor is currently the most advanced implementation of Onion Routing in use today. Tor is currently deployed on the Internet.
  • 13. What is TOR?  It was originally developed for primary purpose of protecting government communications.  Today, it is an open source software project used everyday for wide variety of purposes by normal people, the military, journalists, law enforcement agencies and activists.  It is a distributed anonymous network. It reduce the risks of both simple and sophisticated traffic analysis by distributing transactions over several places on the Internet.  Data packets on the Tor network take a random pathway through several relays.  No observer at any single point can tell where the data came from or where it's going.
  • 14. TOR overview, deployment and statistics  It introduces Hidden services. Servers which can only be accessed via the TOR overlay.  It is the largest, most well deployed anonymity preserving service on the internet. It is publically available since 2002. It is continuous in development.  Currently, ~5000 Tor relays are present around the world. All relays are run by volunteers. It is suspected that some are controlled by intelligence agencies.  TOR network can be accessed by using TOR browser.
  • 15. How TOR works?  Tor provides anonymity by bouncing your Internet traffic around a distributed network of encrypted relays run by volunteers around the world.
  • 20. Onion Address  Onion addresses starts with .onion  It is only accessible via a TOR network.  onion is a pseudo-top-level domain host suffix designating an anonymous hidden service reachable via the TOR network.  Example of onion url is  http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine  http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
  • 21. Conclusion  Onion Routing protects the anonymity of a user and hide the destinations of all communications initiated by the user.  Any outside observers will not be able to tell whom the user is communicating with and for how long.  Onion Routing uses Public Key Encryption to put multiple layers of encryption around the original data packet, thus creating an object called an onion.  This onion will follow a specific route through the network, and at each route a layer of encryption will be peeled off. Once the onion reaches its destination it will have been reduced to the original data packet.  When a router decrypts the onion using its private key it will only get the address of the next router along the path. So no router will ever know the full path that is travelled by the onion.  Since no outside observer will be able to follow an onion while it is travelling through the network, the communication is completely anonymous.
  • 22. References  http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group10/#1  http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof- explains/  http://tor.eff.org/  http://thehiddenwiki.org/  https://www.deepdotweb.com/how-to-access-onion-sites/