[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] obfs4 questions



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 29/11/14 00:35, Yawning Angel wrote:
> On Fri, 28 Nov 2014 17:57:26 +0000 Michael Rogers
> <michael@xxxxxxxxxxxxxxxx> wrote:
> 
>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
>> 
>> On 28/11/14 15:50, Yawning Angel wrote:
>>> A one time poly1305 key is calculated for each box, based on
>>> 32 bytes of zeroes encrypted with a one time Salsa20
>>> key/counter derived from the nonce and the box key.  You can
>>> view the use of Salsa20 there as an arbitrary keyed hash
>>> function (in the case of the original paper, AES was used).
>>> 
>>> Hope that clarifies things somewhat,
>> 
>> Thanks - this is similar to the argument I came up with. I called
>> my argument hand-wavy because it relies on HSalsa20 and Salsa20
>> being PRFs, and I don't know how big an assumption that is.
> 
> For what it's worth "7 Nonce and stream" both support using a
> counter here as the nonce, and refers to 'The standard ("PRF")
> security conjecture for Salsa20".  IIRC the security proof for the
> extended nonce variants also hinges on the underlying algorithms
> being PRFs as well, so it's something I'm comfortable in assuming.
> 
> http://cr.yp.to/highspeed/naclcrypto-20090310.pdf

Awesome, thanks!

Cheers,
Michael

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJUeYwsAAoJEBEET9GfxSfM9PsIAIADA/7Lfkx9kxxkvfggMNQZ
Ln71QB//POwEskJSVftg/NE30pdw9KiYA8EJLA5El62UxUT4NS8OOyiGTSXz3IDo
dvBcnOls9HAVYeE7HjOeKdiwwitjBv0+QFetGY+0XNAjkmHLkU+cQdO9+jkJ122l
nWLFaOj1o3qjx7QHiL7TKqFf+Rh1P/quurNBYrexM2uRxsAXQgncGMVaLgGAdvmu
h09NotPW5sDTmu4m6HgRFQKYD15sPkkF2C65IkQNiO0Al7NIVcxq6JEtzLMcK66t
jZpvZe+U/XrgEFqzkxYep20bFITTovXkC6cMhm4iA5X58ZKWnGf8eBxVs/RCDCY=
=2auj
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev