S.8 Anonymizing Overlay Networks

From CyberEdWiki
Jump to: navigation, search

Example topics are as follows:

  • Goals and Threat Models for Anonymous Communication
  • Overview of Relevant Crypto (private key [AES, et al] and public key systems [RSA, elliptic curve, ElGamal, et al], hashing, key exchange [e.g., Diffie-Hellman], digital signature algorithms [DSA, ECDCSA, et al])
  • Distributed Hash Tables (DHTs)
  • P2P Networks
  • Anonymous Routing
  • Survey of Current-Generation Anonymizing Networks (Tor, I2P, Freenet, ZeroNet, et al)
  • Hidden Web Services
  • Anonymity Applications (e.g., secure email, chat, blog syndication)
  • Anonymous Distributed Storage (e.g., TAHOE LAFS)
  • De-anonymization