E4PU(3's IP address,E3PU((5'sIP address,(E5PU(recipients IP address, data))))).
Figure 4.2 Key Encrypted Onion
The intermediary at that point sends the onion to the primary onion switches i.e 4. Onion switch 4 strips the external layer of the onion utilizing its private key. It advances the onion to 3 which presently looks like figure 4.3 and is spoken to as
E3PU((5's IP ADDRESS,(E5PU(recipient's IP address, data))))
Figure 4.3 Intermediate Node 4 Peels the Outer Layer of the Onion utilizing its Private Key
Onion switch 3 strips the external layer of the onion utilizing its private key. It advances the onion to 5 which currently looks like figure 4.4 and is spoken to as (E5PU(recipient's IP address, information)).
Figure 4.4 Intermediate Node 3 Peels the Outer Layer of the Onion Using Its Private Key.
Onion switch 5 strips the external layer of the onion utilizing its private key. It finds the plain information and the goal address and advances it to the goal.
Figure 4.5 Intermediate Node 5 Peels the Outer Layer of the Onion utilizing its Private Key.
The size of the onion diminishes as it approaches the goal. Consequently assailants can construe the insights regarding the goal. To dodge this onions are cushioned at every onion switch to keep up the size of the onion. Each onion switches has subtleties of just its past and next bounce. So regardless of whether an onion switch has been undermined the aggressor can get just the scrambled onion. The aggressor won't have the option to unscramble the onion without the private keys and subsequently won't gather any significant data from it. How the encryption and unscrambling process happens.