[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
The dh small subgroup confinement attack and Tor
- To: or-talk@xxxxxxxxxxxxx
- Subject: The dh small subgroup confinement attack and Tor
- From: Ringo <2600denver@xxxxxxxxx>
- Date: Fri, 07 Aug 2009 19:20:13 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Fri, 07 Aug 2009 19:20:50 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:x-enigmail-version:content-type :content-transfer-encoding; bh=fc4n2gU8NQx47MgUlelcDNIyrc7BdGKD5DB+DwQrlzg=; b=jzOErrtxuwCRa03ndiCjpsWmoogZara9UIZvJbTnDxexH2wc1ReOt09nZKKFKd9Pt7 3EvecjmOIhr7lA/unhTD8MowHkvqibe0LZfxU34JpKKCdnWfFRAApziN6iESpSaEzaKl 36xFRsGRxxQRQrve5gOZGGF4LBD3rpY5AAVaQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject :x-enigmail-version:content-type:content-transfer-encoding; b=vn/UXorWXS02TWdB9WYK10c7p9sPPpzqUlvHuEHyYaM5Fh5V91fnzn4Oi35ZoCCQls Oj41QrnT3k40BmOUaRievhAunb+c3U/i09YlVxND0GIUdLVApd2+y5QKcaA8/xr2GC40 +CJs6y/FxEJyV/MSoy58ADA8p3S7jABWzUB6I=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.21 (X11/20090318)
Hey Tor,
I was watching a presentation today
(http://www.youtube.com/watch?v=ySQl0NhW1J0) and saw that this attack
applied to some of the cryptography Tor uses. I googled around and
couldn't find any information about where this attack would apply in Tor
or if it had been fixed. It could be that this attack would still apply
but that the way Tor implements the crypto, it's risks are negated.
Is there anybody who can clear up my confusion?
Thanks,
Ringo