On the security of the tor authentication protocol

  • Authors:
  • Ian Goldberg

  • Affiliations:
  • David R. Cheriton School of Computer Science, University of Waterloo, Waterloo

  • Venue:
  • PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Tor is a popular anonymous Internet communication system, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly authenticating nodes to clients, but Tor uses a custom protocol, rather than an established one, to perform this authentication. In this paper, we provide a formal proof of security of this protocol, in the random oracle model, under reasonable cryptographic assumptions.