[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6369 [Analysis]: Gather empirical data on AES/RSA operations performed by typical relays or bridges
#6369: Gather empirical data on AES/RSA operations performed by typical relays or
bridges
----------------------+-----------------------------------------------------
Reporter: karsten | Owner: karsten
Type: task | Status: new
Priority: normal | Milestone:
Component: Analysis | Version:
Keywords: | Parent:
Points: | Actualpoints:
----------------------+-----------------------------------------------------
Comment(by karsten):
weasel just said on #tor-dev that 1 AES operation may not be correct for
16 written or read bytes. That number doesn't include TLS on incoming and
outgoing side. So, a middle node would do AES-for-TLS, AES, AES-for-TLS,
that is, 3 AES operations. An exit wouldn't do the final AES-for-TLS, so
just 2 AES operations. But 3 may be a good upper bound here.
Does that make sense? Or is 3 AES operations per 16 bytes of relayed data
still totally off?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6369#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs