[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5460 [Tor]: Write proposal(s) to evaluate circuit crypto authentication



#5460: Write proposal(s) to evaluate circuit crypto authentication
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  nickm
  mikeperry              |     Status:  assigned
         Type:  defect   |  Milestone:  Tor: 0.2.???
     Priority:  major    |    Version:
    Component:  Tor      |   Keywords:  needs-proposal, tor-client, path-
   Resolution:           |  bias, 027-triaged-1-out
Actual Points:           |  Parent ID:  #5456
       Points:           |
-------------------------+-------------------------------------------------
Changes (by nickm):

 * cc: yawning (added)


Comment:

 See Yawning's experimental results at
 https://lists.torproject.org/pipermail/tor-dev/2015-March/008485.html : it
 seems that LIONESS is going to be a heck of a lot slower than we can
 accept.

 Hope is on the way, perhaps: DJB and Rogaway both tell me that AEZ is
 probably fast enough and secure enough. (Especially if we're willing to
 depend on AESNI.)  DJB says that he's got a more generic construction in
 the works that doesn't rely on the AES round function, and if that's done
 soon enough, we can consider that one too.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5460#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs