[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5460 [Tor]: Write proposal(s) to evaluate circuit crypto authentication
#5460: Write proposal(s) to evaluate circuit crypto authentication
-------------------------+-------------------------------------------------
Reporter: | Owner: nickm
mikeperry | Status: assigned
Type: defect | Milestone: Tor: 0.2.???
Priority: major | Version:
Component: Tor | Keywords: needs-proposal, tor-client, path-
Resolution: | bias, 027-triaged-1-out
Actual Points: | Parent ID: #5456
Points: |
-------------------------+-------------------------------------------------
Changes (by nickm):
* cc: yawning (added)
Comment:
See Yawning's experimental results at
https://lists.torproject.org/pipermail/tor-dev/2015-March/008485.html : it
seems that LIONESS is going to be a heck of a lot slower than we can
accept.
Hope is on the way, perhaps: DJB and Rogaway both tell me that AEZ is
probably fast enough and secure enough. (Especially if we're willing to
depend on AESNI.) DJB says that he's got a more generic construction in
the works that doesn't rely on the AES round function, and if that's done
soon enough, we can consider that one too.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5460#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs