[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #6369 [Analysis]: Gather empirical data on AES/RSA operations performed by typical relays or bridges



#6369: Gather empirical data on AES/RSA operations performed by typical relays or
bridges
----------------------+-----------------------------------------------------
 Reporter:  karsten   |          Owner:  karsten
     Type:  task      |         Status:  new    
 Priority:  normal    |      Milestone:         
Component:  Analysis  |        Version:         
 Keywords:            |         Parent:         
   Points:            |   Actualpoints:         
----------------------+-----------------------------------------------------

Comment(by karsten):

 weasel just said on #tor-dev that 1 AES operation may not be correct for
 16 written or read bytes.  That number doesn't include TLS on incoming and
 outgoing side.  So, a middle node would do AES-for-TLS, AES, AES-for-TLS,
 that is, 3 AES operations.  An exit wouldn't do the final AES-for-TLS, so
 just 2 AES operations.  But 3 may be a good upper bound here.

 Does that make sense?  Or is 3 AES operations per 16 bytes of relayed data
 still totally off?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6369#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs