- Chaum mixes
Generally considered the father of anonymous communications,
David Chaum first proposed a system for anonymous email in 1981. The system he proposed used a special mail server, called a Mix, to process email.A Mix is a computer that mediates between senders and recipients. A Mix is a store-and-forward device that accepts a number of fixed-length messages from numerous sources, performs cryptographic transformations on the messages, and then forwards the messages to the next destination in an order not predictable from the order of inputs.
MIX enables anonymous communication by means of cryptography, scrambling the messages, and unifying them (padding to constant size, fixing a constant sending rate by sending dummy messages, etc.).
Chaum Mixes support sender anonymity, and protect from traffic analysis.a Mix looks like a black box with myriad inputs and outputs. As long as the integrity of the box is assured, tracking a specific message through the Mix is a difficult challenge.
How it works
Participant "A" prepares a message for delivery to participant "B" by appending a random value to the message, sealing it with the addressee's public key , appending B’s address, and then sealing the result with the Mix's public key .M opens it with his private key, now he knows B’s address, and he sends to B.
Message format:
To accomplish this, the sender takes the Mix’s public key (), and uses it to encrypt an envelope containing a random string (), a nested envelope addressed to the recipient, and the email address of the recipient ("B"). This nested envelope is encrypted with the recipient’s public key (), and contains another random string ("R0"), along with the body of the message being sent. Upon receipt of the encrypted top-level envelope, the Mix uses its secret key to open it. Inside, it finds the address of the recipient ("B") and an encrypted message bound for "B". The random string () is discarded.
Return Addresses:
What is needed now is a way for "B" to respond to "A" while still keeping the identity of "A" secret from "B".
A solution is for "A" to form an untraceable return address where is its own real address, is a public one-time key chosen for the current occasion only, and is a key that will also act as a random string for purposes of sealing. Then, "A" can send this return address to "B" as part of a message sent by the techniques already described.
B sends to M, and M transforms it to . This Mix uses the string of bits that it finds after decrypting the address part as a key to re-encrypt the message part . Only the addressee, "A", can decrypt the resulting output because "A" created both and . The additional key assures that the Mix cannot see the content of the reply-message. The following indicates how "B" uses this untraceable return address to form a response to "A", via a new kind of mix:
The message from "A" "B":
Reply message from "B""A":
Where: = "B"’s public key, = the mix’s public key.
A destination can reply to a source without sacrificing source anonymity. The reply message shares all of the performance and security benefits with the anonymous messages from source to destination.
Goals
The purpose of a mix is to hide the correspondences between the items in its input and those in its output. (Note: if just one item is repeated in the input and allowed to be repeated in the output, then the correspondence is revealed for that item).By routing through numerous Mixes in the network, determining who is talking to who is made even more difficult.
ee also
*
Mix network
*Onion routing
*Anonymous P2P Further reading
* "Email Security",
Bruce Schneier (ISBN 0-471-05318-X)
* "Computer Privacy Handbook", Andre Bacard (ISBN 1-56609-171-3)
Wikimedia Foundation. 2010.