English subtitles

← 06-05 Onion Routing

Get Embed Code
1 Language

Showing Revision 1 created 06/29/2012 by Amara Bot.

  1. Now Dave wants to communicate with Alice
  2. without anyone being able to know they're communicating,
  3. and we have a set of routers. These are like our friends in the example of the envelopes.
  4. Let's say I know about five routers. We'll call them R1, R2, R3, R4, and R5.
  5. The routers are all connected. They can all talk to each other.
  6. They can all talk to Alice, and they can all talk to me.
  7. We're assuming we have a fully connected network here.
  8. I haven't drawn all the connections, because that would get kind of messy.
  9. We'll assume we have a fully-connected network here,
  10. and we don't need to have a physically fully-connected network.
  11. There could be other nodes in between these.
  12. We're assuming we have secure channels between each of the routers,
  13. and we can set up those channels using TLS,
  14. so we have these secure channels between all of the routers
  15. and between all the participants, including myself and Alice.
  16. We'll select some random sequence of the routers.
  17. Each of these i values is one of the values that identifies a router,
  18. and I want to send a message into this network.
  19. Let's assume for now that the last router that I select is R4.
  20. I want it to be the case that R4 sends the final message to Alice that Alice can read.
  21. The question is what message should R4 receive?
  22. The answers are encrypted with Alice's public key.
  23. The message to Alice in clear concatenated with the message--
  24. this is the message Dave wants to send to Alice
  25. encrypted using the public key of R4.
  26. Encrypted using the public key of R4, the message to Alice concatenated with
  27. the message encrypted with Alice's public key.
  28. Encrypted using the private key of Bob, the message to Alice concatenated with
  29. the message encrypted with the public key of R4.
  30. Or the message to Alice concatenated with the message encrypted with
  31. the public key of Alice all encrypted with the public key of Bob.