[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #17799 [Tor]: Hash All PRNG output before use
#17799: Hash All PRNG output before use
--------------------+------------------------------------
Reporter: teor | Owner:
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.2.8.x-final
Component: Tor | Version: Tor: unspecified
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Sponsor: |
--------------------+------------------------------------
Comment (by nickm):
I think their performance is likely to be worse, but their space usage is
likely to be better. If I'm doing the math right, and we're using
SHAKE-128 or equivalent, and we assume that we want to have 2^256^
security against backtracking attacks, I get 166.7 bytes per Keccak-f call
with 4K memory usage, and they get 152 bytes,with somewhere between 200
and 400 bytes of memory usage.
(I'm also assuming that reseed events are comparatively uncommon. If
that's wrong, oops!)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17799#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs