How does tor work?

Share

The onion router (Tor) is a web browser that provides better security and privacy to its users. It can perform all the functions of a traditional browsing application while keeping its users anonymous.

widget

How does tor work?

Tor browser, as the name suggests, works on the onion routing protocol. It encrypts the message in layers of encryption and sends it over several relaysThey are tor servers used to route traffic on the tor network.. The onion routing is explained in the following section:

Onion routing

The working of the onion routing is described as follows:

  1. First, we generate a request that they want to send to a server, such as Google, over the tor network.

  2. We then decides the three relays that they want to use to route this request, for example R1,R2,R3.R1, R2, R3.

  3. We acquire the public keys to these three relays (R1p,R2p,R3pR1_p, R2_p, R3_p).

  4. We encrypt the message mmusing google's public key GpG_p and obtain the encrypted message m.m'.

  5. We encrypt the mm' using the public key of the third relay R3pR3_p and obtain m.m''.

  6. We encrypt the mm''using the public key of the second relay R2pR2_p and obtain m.m'''.

  7. We encrypt the mm''' using the public key of the first relay R1pR1_p and obtain the final message m.m''''.

  8. We then sends mm'''' to the first relay.

  9. The first relay removes the last layer of encryption (that was encrypted using its public key) by decrypting it with its private/secret key R1sR1_s and obtains m.m'''.

  10. The second relay removes the second last layer of encryption and sends the resulting message mm'' to the third relay, which then removes the third last layer of encryption and sends the resulting message mm' to the destination (google).

  11. Google then decrypts the message it received mm' and obtains the actual message m.m.

  12. Server/google then processes the request and sends a response to the user and follows the same process.

    1. It sends the packet to R3R3 which encrypts the message with its private/secret key.

    2. R3R3 then sends it to R2R2 which encrypts the message with its private/secret key.

    3. R2R2 then sends it to R1R1 which finally routes the packet to the user.

  13. The user then removes all the layers of encryption and views the final response.

Copyright ©2024 Educative, Inc. All rights reserved