• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

Vol. 4, No.3, June 30, 2010
10.3837/tiis.2010.06.011, Download Paper (Free):

Abstract

In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present modifications to the ModOnion protocol that dramatically reduce the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Nikita Borisov, Marek Klonowski, Mirosaw Kutyowski and Anna Lauks-Dutka, "Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach," KSII Transactions on Internet and Information Systems, vol. 4, no. 3, pp. 380-399, 2010. DOI: 10.3837/tiis.2010.06.011

[ACM Style]
Borisov, N., Klonowski, M., Kutyowski, M., and Lauks-Dutka, A. 2010. Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach. KSII Transactions on Internet and Information Systems, 4, 3, (2010), 380-399. DOI: 10.3837/tiis.2010.06.011