Hashing it out in public: Common failure modes of DHT-based anonymity schemes. Tran, A., Hopper, N. J., & Kim, Y. November 2009.
Hashing it out in public: Common failure modes of DHT-based anonymity schemes [link]Paper  doi  abstract   bibtex   
We examine peer-to-peer anonymous communication systems that use Distributed Hash Table algorithms for relay selection. We show that common design flaws in these schemes lead to highly effective attacks against the anonymity provided by the schemes. These attacks stem from attacks on DHT routing, and are not mitigated by the well-known DHT security mechanisms due to a fundamental mismatch between the security requirements of DHT routing\textquoterights put/get functionality and anonymous routing\textquoterights relay selection functionality. Our attacks essentially allow an adversary that controls only a small fraction of the relays to function as a global active adversary. We apply these attacks in more detail to two schemes: Salsa and Cashmere. In the case of Salsa, we show that an attacker that controls 10% of the relays in a network of size 10,000 can compromise more than 80% of all completed circuits; and in the case of Cashmere, we show that an attacker that controls 20% of the relays in a network of size 64000 can compromise 42% of the circuits.
@conference {wpes09-dht-attack,
	title = {Hashing it out in public: Common failure modes of DHT-based anonymity schemes},
	booktitle = {Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009)},
	year = {2009},
	month = {November},
	publisher = {ACM},
	organization = {ACM},
	abstract = {We examine peer-to-peer anonymous communication systems that use Distributed Hash Table algorithms for relay selection. We show that common design flaws in these schemes lead to highly effective attacks against the anonymity provided by the schemes. These attacks stem from attacks on DHT routing, and are not mitigated by the well-known DHT security mechanisms due to a fundamental mismatch between the security requirements of DHT routing{\textquoteright}s put/get functionality and anonymous routing{\textquoteright}s relay selection functionality. Our attacks essentially allow an adversary that controls only a small fraction of the relays to function as a global active adversary. We apply these attacks in more detail to two schemes: Salsa and Cashmere. In the case of Salsa, we show that an attacker that controls 10\% of the relays in a network of size 10,000 can compromise more than 80\% of all completed circuits; and in the case of Cashmere, we show that an attacker that controls 20\% of the relays in a network of size 64000 can compromise 42\% of the circuits.},
	keywords = {anonymity, denial-of-service, P2P},
	isbn = {978-1-60558-783-7},
	doi = {10.1145/1655188.1655199},
	url = {http://portal.acm.org/citation.cfm?id=1655188.1655199},
	author = {Andrew Tran and Nicholas J. Hopper and Yongdae Kim}
}

Downloads: 0