Re: [tor-dev] Rewriting tor-spec to be crypto agnostic

2011-11-02 Thread Nick Mathewson
On Wed, Nov 2, 2011 at 9:25 PM, Watson Ladd wrote: > Dear all, > I'm busy rewriting tor-spec (well, mangling it) to be crypto agnostic > (read: shoving hard choices to later). In the process I am trying to > make it a bit clearer. Hi, Watson! Some initial thoughts to observe or ignore as you see

[tor-dev] Rewriting tor-spec to be crypto agnostic

2011-11-02 Thread Watson Ladd
Dear all, I'm busy rewriting tor-spec (well, mangling it) to be crypto agnostic (read: shoving hard choices to later). In the process I am trying to make it a bit clearer. The spec seems to hold open the possibility that nodes not on the two ends of a circuit can send recognized RELAY cells (the ro

Re: [tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Nick Mathewson
On Wed, Nov 2, 2011 at 2:19 PM, Watson Ladd wrote: > On Wed, Nov 2, 2011 at 11:45 AM, Robert Ransom wrote: >> On 2011-11-02, Watson Ladd wrote: >>> Dear All, >>[...omitted..] >> >>> Right now Tor encrypts the streams of data from a client to a OR with >>> AES-CTR and no integrity checks. >> >> B

Re: [tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Paul Syverson
On Wed, Nov 02, 2011 at 01:19:52PM -0500, Watson Ladd wrote: > On Wed, Nov 2, 2011 at 11:45 AM, Robert Ransom wrote: > > On 2011-11-02, Watson Ladd wrote: > >> Dear All, > >[...omitted..] > > > >> Right now Tor encrypts the streams of data from a client to a OR with > >> AES-CTR and no integrity

Re: [tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Watson Ladd
On Wed, Nov 2, 2011 at 11:45 AM, Robert Ransom wrote: > On 2011-11-02, Watson Ladd wrote: >> Dear All, >[...omitted..] > >> Right now Tor encrypts the streams of data from a client to a OR with >> AES-CTR and no integrity checks. > > Bullshit.  We have a 32-bit-per-cell integrity check at the end

Re: [tor-dev] SHA-3 isn't looking so hot to me (was: Draft sketch document with ideas for future crypto ops)

2011-11-02 Thread unknown
On Tue, 1 Nov 2011 14:51:00 -0700 coderman wrote: > On Tue, Nov 1, 2011 at 1:20 PM, Zooko O'Whielacronx wrote: > > ... > > Therefore, in the context of whether we can expect SHA-3 and/or > > SHA-256 circuits to come built into our chips in the future, the fact > > that SHA-256 can be implemented

Re: [tor-dev] Draft sketch document with ideas for future crypto ops

2011-11-02 Thread unknown
On Mon, 31 Oct 2011 23:59:55 -0500 Watson Ladd wrote: > What about this for modification resistance? > We keep a count of all cells passing and use AES in CTR mode with a 2 part > counter: the first part the cell counter, the second one a block counter. > Then to authenticate the cell we can use

Re: [tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Nick Mathewson
On Wed, Nov 2, 2011 at 12:45 PM, Robert Ransom wrote: > On 2011-11-02, Watson Ladd wrote: >> Dear All, >> Rather then get further sucked into a debate that is producing more >> heat then light about Wegman-Carter, I've decided to make a concrete >> proposal for how Tor can better protect its stre

Re: [tor-dev] Draft sketch document with ideas for future crypto ops

2011-11-02 Thread Robert Ransom
On 2011-11-01, Roger Dingledine wrote: > On Mon, Oct 31, 2011 at 09:25:58PM -0400, Nick Mathewson wrote: >> The point of this document is to discuss what crypto we ought to be >> using. > > Thanks Nick! > >> - To make sure that the extending node is talking to the right next >> node >>

Re: [tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Robert Ransom
On 2011-11-02, Watson Ladd wrote: > Dear All, > Rather then get further sucked into a debate that is producing more > heat then light about Wegman-Carter, I've decided to make a concrete > proposal for how Tor can better protect its streams from manipulation. Your proposal is so detailed and conc

Re: [tor-dev] SHA-3 isn't looking so hot to me

2011-11-02 Thread Zooko O'Whielacronx
For what it is worth, I would probably prefer Poly1305-AES over HMAC if I were needing message integrity. I don't know if I would prefer Poly1305-AES over using an integrated-integrity mode like GCM. On Wed, Nov 2, 2011 at 2:20 AM, Markku-Juhani O. Saarinen wrote: > > As a hash function research

[tor-dev] A concrete proposal for crypto (at least part of it)

2011-11-02 Thread Watson Ladd
Dear All, Rather then get further sucked into a debate that is producing more heat then light about Wegman-Carter, I've decided to make a concrete proposal for how Tor can better protect its streams from manipulation. Right now Tor encrypts the streams of data from a client to a OR with AES-CTR an

[tor-dev] SHA-3 isn't looking so hot to me

2011-11-02 Thread Markku-Juhani O. Saarinen
Watson Ladd: > (HMAC is a bad idea anyway: quadratic security bounds are not the best > possible, we have to use nonces anyway to prevent replay attacks, so > Wegman-Carter is a better idea for better in{faster, more secure}. GCM > would be an example of this.) GCM has quadratic security bounds,