Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Open Computer Science

Editor-in-Chief: van den Broek, Egon

Covered by:
Web of Science - Emerging Sources Citation Index


ICV 2017: 98.90

Open Access
See all formats and pricing
More options …

Introducing OGR — a new approach to anonymous IP datagram transmission based on the Chaumian ‘onion’ encryption and the KISS principle

Marek Kozłowski
  • Faculty of Mathematics and Information Sciences, Warsaw University of Technology, Pl. Politechniki 1, 00-661, Warsaw, Poland
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2012-12-28 | DOI: https://doi.org/10.2478/s13537-012-0034-4


The goal of this paper is to introduce a technique, called ‘OGR’, that allows anonymous transmission of IP datagrams of any kind. During the last decade numerous anonymizing solutions implementing the Chaumian ‘onion’ encryption have been proposed. Many of them are dedicated to specific services: either anonymous mail delivery or anonymous storage sharing, while the other ones, referred as low-latency systems, work real-time and are able to anonymize any TCP streams (with preference to http), but poorly deal with or even don’t support other transports. ‘OGR’ is strongly inspired by the original Chaumian Mix-net model and aims at universality (the ability to work at the level of IP datagrams rather than upper-layers protocols) and maximal simplicity (the KISS principle). It discards the idea of fixed circuits (or cascades) present in most low-latency solutions in favor of independent, intelligent packets. Although this approach may occur less efficient for huge data streams it’s able to handle any request-reply protocols including those operating over UDP as well as all applications where other transports or raw IP packets are to be used.

Keywords: anonymous communication; onion routing; IP datagram; TCP/IP network

  • [1] Bennett K., Grothoff C., GAP — practical anonymous networking, In: Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760, http://grothoff.org/christian/aff.pdf (last accessed: 01/06/2012) Google Scholar

  • [2] Chaum D., Untraceable electronic mail, return addresses, and digital pseudo-nyms, Commun. ACM, 4, February 1981, http://freehaven.net/anonbib/cache/chaum-mix.pdf (last accessed: 01/06/2012) Google Scholar

  • [3] Denezis G, Dingledine R., Mathewson N., Mixminion: Design of a Type III Anonymous Remailer Protocol, In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, May 2003, http://www.mixminion.net/minion-design.pdf (last accessed: 01/06/2012) Google Scholar

  • [4] Dingledine R., Mathewson N., Syverson P., Tor: The Second-Generation Onion Router, In: Procedings of the 13th USENIX Security Symposium, August 2004, http://www.usenix.org/events/sec04/tech/dingledine.html (last accessed: 01/06/2012) Google Scholar

  • [5] Freedman M.J., Morris R., Tarzan: A Peer-to-Peer Anonymizing Network Layer, In: Proceedings of the ACM Conference on Computer and Communications Security (CCS 9), Washington, D.C. November 2002, http://pdos.csail.mit.edu/tarzan/docs/tarzan-ccs02.pdf (last accessed: 01/06/2012) Google Scholar

  • [6] Reiter M.K., Rubin A.D., Crowds: Anonymity for web transactions, ACM TISSEC, 1, June 1998, http://avirubin.com/crowds.pdf (last accessed: 01/06/2012) Google Scholar

  • [7] Rennhard M., Plattner B., Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection, In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002) Google Scholar

About the article

Published Online: 2012-12-28

Published in Print: 2012-12-01

Citation Information: Open Computer Science, Volume 2, Issue 4, Pages 412–425, ISSN (Online) 2299-1093, DOI: https://doi.org/10.2478/s13537-012-0034-4.

Export Citation

© 2012 Versita Warsaw. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. BY-NC-ND 3.0

Comments (0)

Please log in or register to comment.
Log in