A Survey on I2P Crypto Mechanism
- Miss. Dipal Vashi
- Mr. Girish Khilari
Darknet, Anonymous Network, TOR, I2P, I2P Crypto, Encryption Mechanism.
The Darknet is a part of the deep web as its contents are not accessible through search engines. But it is also anonymous cyber space. This anonymity is usually achieved using TOR-The Onion Router. Another darknet system (or privacy network) called I2P is growing in popularity. Although many users use TOR, there appears to be a precise shift towards I2P. I2P is original short for Invisible Internet Project which offers a range of improvements such as email, file sharing & storage plug-ins and other social applications like blogging and chatting. All information is wrapped with many layers of encryption (like AES).
In this paper we will study TOR, I2P, and existing I2P Crypto. This study will help us to provide more security to identity of I2P hosts and users and also to find mechanism to avoid the attacks that can compromise the anonymity.
Volume 3 Issue 1
Pages. 99-102