[tor-bugs] #17799 [Tor]: Hash All PRNG output before use

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Dec 20 18:52:42 UTC 2015


#17799: Hash All PRNG output before use
--------------------+------------------------------------
 Reporter:  teor    |          Owner:
     Type:  defect  |         Status:  needs_revision
 Priority:  Medium  |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor     |        Version:  Tor: unspecified
 Severity:  Normal  |     Resolution:
 Keywords:          |  Actual Points:
Parent ID:          |         Points:
  Sponsor:          |
--------------------+------------------------------------

Comment (by nickm):

 I think their performance is likely to be worse, but their space usage is
 likely to be better.  If I'm doing the math right, and we're using
 SHAKE-128 or equivalent, and we assume that we want to have 2^256^
 security against backtracking attacks, I get 166.7 bytes per Keccak-f call
 with 4K memory usage, and they get 152 bytes,with somewhere between 200
 and 400 bytes of memory usage.

 (I'm also assuming that reseed events are comparatively uncommon.  If
 that's wrong, oops!)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17799#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list