Jump to ContentJump to Main Navigation
Show Summary Details
In This Section

Open Computer Science

Editor-in-Chief: van den Broek, Egon

1 Issue per year

Open Access
See all formats and pricing
In This Section

Introducing OGR — a new approach to anonymous IP datagram transmission based on the Chaumian ‘onion’ encryption and the KISS principle

Marek Kozłowski
  • Faculty of Mathematics and Information Sciences, Warsaw University of Technology, Pl. Politechniki 1, 00-661, Warsaw, Poland
  • Email:
Published Online: 2012-12-28 | DOI: https://doi.org/10.2478/s13537-012-0034-4


The goal of this paper is to introduce a technique, called ‘OGR’, that allows anonymous transmission of IP datagrams of any kind. During the last decade numerous anonymizing solutions implementing the Chaumian ‘onion’ encryption have been proposed. Many of them are dedicated to specific services: either anonymous mail delivery or anonymous storage sharing, while the other ones, referred as low-latency systems, work real-time and are able to anonymize any TCP streams (with preference to http), but poorly deal with or even don’t support other transports. ‘OGR’ is strongly inspired by the original Chaumian Mix-net model and aims at universality (the ability to work at the level of IP datagrams rather than upper-layers protocols) and maximal simplicity (the KISS principle). It discards the idea of fixed circuits (or cascades) present in most low-latency solutions in favor of independent, intelligent packets. Although this approach may occur less efficient for huge data streams it’s able to handle any request-reply protocols including those operating over UDP as well as all applications where other transports or raw IP packets are to be used.

Keywords: anonymous communication; onion routing; IP datagram; TCP/IP network

  • [1] Bennett K., Grothoff C., GAP — practical anonymous networking, In: Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, http://grothoff.org/christian/aff.pdf (last accessed: 01/06/2012)

  • [2] Chaum D., Untraceable electronic mail, return addresses, and digital pseudo-nyms, Commun. ACM, 4, February 1981, http://freehaven.net/anonbib/cache/chaum-mix.pdf (last accessed: 01/06/2012)

  • [3] Denezis G, Dingledine R., Mathewson N., Mixminion: Design of a Type III Anonymous Remailer Protocol, In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, May 2003, http://www.mixminion.net/minion-design.pdf (last accessed: 01/06/2012)

  • [4] Dingledine R., Mathewson N., Syverson P., Tor: The Second-Generation Onion Router, In: Procedings of the 13th USENIX Security Symposium, August 2004, http://www.usenix.org/events/sec04/tech/dingledine.html (last accessed: 01/06/2012)

  • [5] Freedman M.J., Morris R., Tarzan: A Peer-to-Peer Anonymizing Network Layer, In: Proceedings of the ACM Conference on Computer and Communications Security (CCS 9), Washington, D.C. November 2002, http://pdos.csail.mit.edu/tarzan/docs/tarzan-ccs02.pdf (last accessed: 01/06/2012)

  • [6] Reiter M.K., Rubin A.D., Crowds: Anonymity for web transactions, ACM TISSEC, 1, June 1998, http://avirubin.com/crowds.pdf (last accessed: 01/06/2012)

  • [7] Rennhard M., Plattner B., Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection, In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)

About the article

Published Online: 2012-12-28

Published in Print: 2012-12-01

Citation Information: Open Computer Science, ISSN (Online) 2299-1093, DOI: https://doi.org/10.2478/s13537-012-0034-4. Export Citation

© 2012 Versita Warsaw. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. (CC BY-NC-ND 3.0)

Comments (0)

Please log in or register to comment.
Log in