An anonymous reader writes from a report via PC Magazine: Following the recent vulnerabilities in Tor, researchers at MIT’s Computer Science and Artificial Intelligence Laboratory and the Ecole Polytechnique Federale de Lausanne have been working on a new anonymity network that they say is more secure than Tor. While the researchers are planning to present their new system, dubbed Riffle, at the Privacy Enhancing Technologies Symposium later this month, they did say the system uses existing cryptographic techniques, but in new ways. A series of servers are what make up Riffle, each of which “permutes the order in which it receives messages before passing them on to the next,” according to a news release. “For instance, messages from senders Alice, Bob, and Carol reach the first server in the order A, B, C, that server would send them to the second server in a different order — say C, B, A. The second server would permute them before sending them to the third, and so on.” Nobody would know which was which by the time they exited the last server. Both Tor and MIT’s anonymity network use onion encryption. Riffle uses a technique called verifiable shuffle in addition to onion encryption to thwart tampering and prevent adversaries from infiltrating servers with their own code. Last but not least, it uses authentication encryption to verify the authenticity of an encrypted message. The researchers say their system provides strong security while using bandwidth much more efficiently than similar solutions.
Read more of this story at Slashdot.