Professional Documents
Culture Documents
Cryptography-1 (Group-2)
Presented By:
Rozeena Saleha(19075)
Shawana Khan(19135)
Maira Sultan (19172)
Saira Yousaf(19524)
What it Covers?
• Dark Web [1]
• What is Dark Web? How it work?
All sites in the dark web are onion domains (which basically means both the provider
and user are anonymous and difficult to trace.)
The most infamous of these onion sites was the now-defunct Silk Road, an online
marketplace where users could buy drugs, guns and all sorts of other illegal items[10].
The FBI eventually captured Ross Ulbricht, who operated Silk Road, but copycat sites
like Black Market Reloaded are still readily available.
Following are the biggest deep web links.
https://darkwebnews.com/deep-web-links/
Which Currency is currently using
in Dark Web?
• Most DarkNet vendors deal exclusively in Bitcoin (BTC) because no competitor has more liquidity, price
stability, or widespread adoption. In terms of DarkNet adoption, the next closest currency is Litecoin
(LTC), which historically averages about 5% of Bitcoin’s market capitalization.
• Bitcoin allows you to create a wallet without revealing your identity, but it is not entirely anonymous.
The easiest way to go about this is to buy some coins from a peer-to-peer exchange like LocalBitcoins, or
a wallet service with built in exchange like Coinbase.
• Instead of sending your coins directly to the deposit address for your marketplace account, you just give
the deposit address to the mixing service and they provide you with an new address to make the payment
to – they then do their magic before passing on new ‘clean’ coins that can’t be traced back to you. They
will usually charge you a couple of percent on each transaction for providing this service. Here is a link
to a popular coin mixer coinmixer.se. [2]
• Anoncoin (ANC), ZeroCash project, Monero (XMR) and Bytecoin/Crypto note (BCN), StealthCoin
(XST).
How cryptography helps to
create/develop the Dark web currency?
• PGP stands for ‘pretty good privacy’.
• Escrow involves a trusted third party (almost always the site admin)
arbitrating between the buyer and seller when there is a disagreement.[8]
Each user in TOR network can provide his machine to be used as a Node in
relays.
Onion Routing Protocol Work? [12]
• At each hop, the node “unwraps” a layer from the packet via symmetric
• Relay node
• Exit node
each layer of
Data packet
encryption Exit point have
encrypted as Packet reached
removed as no encryption
number of to destination
moving left
nodes
through nodes
Encryption in TOR
• Node – Node TLS keys
o Both parties decide which algorithms will be used for key and encryption.
• DNS Leaks
• Traffic Analysis
• http://xfmro77i3lixucja.onion/
o Some Library with books,
o over 85000 books for various topics
Is Dark Web Safe..????
• NO .. But why..???
o Everyone is anonymous means untrustworthy
• I2P
• FREENET
• Freepto
• Hornet
Tor security concerns
• Tor is not alien but a simple technology
• To keep privacy , we should use not only Tor but multiple layers of security with
that
• Anti-virus, firewalls, Anti- spywares malwares are are used for this purpose
Proxy Server Issues
• Internet speed of other nodes is a headache
• Web browser cashes pictures and that’s it prison and dark life starts here
Limited Encryption
• Our data is encrypted while inside the network
• Last node from where our data goes out to the requested site ,it will be in plain text
• Ok! They will help but what if your own computer is just compromised ?
• Basically your info will be collected immediately as we type anything even before
sending it to the network
What can we do?
• Why because plug-in which are very seamless can grab our info and compromisation
occur
• for e.g Server may send request to the chrome and try to trick network softwares on
your computer
Downloading Issues
• Downloading should be from trusted source
• Configure it “ perfectly”
• Check box should be check properly other wise will cost high pain
• With Tor ,any socks complaint can use for routing network info
ISP’S Nodes
• Traffic goes from isp nodes as well
• It will be captured by any one in the middle of last node or requested site
What is Bitcoin?
• Bitcoins can be used for online transactions between
individuals“
• WEB
How difficult is to make
Blockchain.info
a bitcoin payment?
Bitcoin adress + private key = wallet
BASE58
Public key SHA 256 RIPEMD BASE56
encoding
Payments [23]
Block chain
• A blockchain is a type of distributed ledger, comprised of
unchangable, digitally recorded data in packages called
blocks. [22]
How it works?
1.
2.
hash solving
backracking previous transaction(Merkle tree)
• .
Minning
• New bitcoins are generated by a
competitive and decentralized process
called "mining".
• This process involves that individuals are
rewarded How are bitcoins
by the network created?
for their services.
Bitcoin miners are processing transactions
and securing the network using specialized
hardware and are collecting new bitcoins in
exchange.
Block reward
Each time a miner successfully solves
Bitcoin’s proof of work algorithm that miner
mined a “block”. The miner or mining pool that
mines a block is rewarded through the block
reward, a set amount of bitcoins agreed upon by
the network. The bitcoins included in the block
reward are all new bitcoins. This is the only way
that new bitcoins are created[24].
Competetion for bitcoin
• Miners take the information in the block, and apply a mathematical
formula to it, turning it into hash.