Learn Mix Networks for Great Good

(maybe the second title should be: Prevent Murder using Mathematics)

Course Syllabus And Reading List

There are no good introductory papers on mix networks. Instead, the approach is to read all the really important academic papers on mix networks. These papers are roughly organized into several categories such as:

Missing from this list are verified shuffles. These are specialized mix strategies which at times are very useful for specific use cases such as voting.

In a few of these mixnet sections I have included youtube videos I’ve made to help explain some of the fundamental mixnet concepts. As you read these mixnet papers keep in mind that decryption mixnets have the following attack categories:

  • tagging attacks

  • n-1 attacks

  • compulsion attacks

  • statistical disclosure attacks

  • epistemic attacks

After all this mix network literature we turn to the Classical Packet Switching Network Literature below in the next major section of reading. Many of these important papers happen to not be academic papers but rather come from industry/IETF and are RFCs. Why read these? Aren’t mixnet papers enough? Yes if you want to only publish papers on mix networks then reading about only mix networks may be enough.

However if you want to design real world mix network systems then understanding the mathematical limitations of the packet switching networking design space is extremely important! You must read about the early Internet design mistakes to understand what not to do in your mix network designs. In your mix network designs you must take care to avoid such fatal conditions such as Congestion Collapse.

Have questions? Sit on them for a week and voraciously read papers. If you still have questions then do feel free to ask me. We have a mailing list and IRC channel for such things:

Mix Network Fundamentals

Watch lecture “A Brief Introduction to mix networks.”

Read Introduction blog post: “Introduction to Mix Networks and Anonymous Communication Networks”

“Untraceable electronic mail, return addresses, and digital pseudonyms”

“Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency — Choose Two”

Mix Strategies

“From a Trickle to a Flood: Active Attacks on Several Mix Types”

“Why I’m not an Entropist”

“Sleeping dogs lie on a bed of onions but wake when mixed”

“Stop-and-Go MIXes: Providing Probabilistic Anonymity in an Open System”

“Heartbeat Traffic to Counter (n-1) Attacks”

“Generalising Mixes”

Mix Network Topology

Watch lecture “Mix Network Topology”

“Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks”

“The disadvantages of free MIX routes and how to overcome them”

Compulsion Attacks And Packet Format

“Sphinx: A Compact and Provably Secure Mix Format”

“Compulsion Resistant Anonymous Communications”

“Forward Secure Mixes”

Note that Jeff Burdges has designed but not completely specified a new forward secure mix design that uses Post Quantum cryptographic ratchets. You can learn more about this here:

Statistical Disclosure Attacks and Decoy Traffic

Watch lecture “Introduction to Statistical Disclosure Attacks and Defenses for Mix Networks”

“Statistical Disclosure or Intersection Attacks on Anonymity Systems”

“Taxonomy of Mixes and Dummy Traffic”

“Limits of Anonymity in Open Environments”

“Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic”

Epistemic Attacks

“Route Finger printing in Anonymous Communications”

“Bridging and Fingerprinting: Epistemic Attacks on Route Selection”

“Local View Attack on Anonymous Communication”

Modern Mix Network Designs

“The Loopix Anonymity System”

“No right to remain silent: Isolating Malicious Mixes”

“A Reputation System to Increase MIX-Net Reliability”

“Two Cents for Strong Anonymity: The Anonymous Post-office Protocol”

“Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis”

Classical Packet Switching Network Literature

Congestion Control

“RFC 896: Congestion Control in IP/TCP Internetworks”

“Congestion Avoidance and Control”

“Promoting the Use of End-to-End Congestion Control in the Internet”

“RFC5681: TCP Congestion Control”

Automatic Repeat Request Protocol Considerations

NOTE: many more papers by Milica Stojanovic about underwater acoustic network protocols can be found here:

“Optimization of a Data Link Protocol for an Underwater Acoustic Channel”

Router Scheduling (for general purpose computers)

“SEDA: An Architecture for Well-Conditioned, Scalable Internet Services”

Active Queue Management

“Controlling Queue Delay: A modern AQM is just one piece of the solution to bufferbloat”

“Random Early Detection Gateways for Congestion Avoidance”

“Controlled Delay Active Queue Management”

“Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness”

“RSFB: Resilient Stochastic Fair Blue algorithm”

Attacks on Congestion Control

“the TCP Daytona paper”

“Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)”

“Flow level detection and filtering of low-rate DDoS”

“The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network”

Congestion Control with Explicit Signaling

NOTE: for more reading on this subject refer to Dr. Sally Floyd’s ECN reading list:

“TCP and Explicit Congestion Notification”

“The Benefits of Using Explicit Congestion Notification (ECN)”

“Performance Evaluation of Explicit Congestion Notification (ECN) in IP Networks”