[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] NSA has cracked web encryption!



07.09.2013 19:41, Nick Mathewson:
No need to worry, no lengthy content, just adding links.

> On Sat, Sep 7, 2013 at 12:02 PM, krishna e bera <keb@xxxxxxxxxxxxxx> wrote:

> I want to fix all that in 0.2.5 -- see proposal 220 [3], and George
> Kadianakis's draft hidden service improvements, and so forth.  I'd
> like to see a Tor that can run with no reliance 1024-bit Z_p crypto
> inside the next three to six months, if at all possible.

Proposal 220
- with line numbers:

https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/220-ecc-id-keys.txt

- without:

https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/220-ecc-id-keys.txt


> (One issue here is that designing ECC groups is not an exercise for
> the likes of me. Using a curve that we made up ourselves would pretty
> much guarantee using cryptographic code we implemented ourselves,
> which is not the wisest thing in the world.  Maybe in a few months DJB
> or somebody will start pushing a "curve38331" or "curve511187"[4] or
> something like that.  If that's so, you can bet we'll be jumping.)
> 
> 
> Symmetric key:
> 
> We're using AES128.  I'm hoping to move to XSalsa20 [...]

https://en.wikipedia.org/wiki/Salsa20
> 
> 
> [3] This only works once users and relays start upgrading to 0.2.4
> though.  Please upgrade!
> [4] These curve names are completely hypothetical.
> 


-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk