[tor-bugs] #17799 [Tor]: Hash All PRNG output before use
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sun Dec 20 18:52:42 UTC 2015
#17799: Hash All PRNG output before use
--------------------+------------------------------------
Reporter: teor | Owner:
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor: 0.2.8.x-final
Component: Tor | Version: Tor: unspecified
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Sponsor: |
--------------------+------------------------------------
Comment (by nickm):
I think their performance is likely to be worse, but their space usage is
likely to be better. If I'm doing the math right, and we're using
SHAKE-128 or equivalent, and we assume that we want to have 2^256^
security against backtracking attacks, I get 166.7 bytes per Keccak-f call
with 4K memory usage, and they get 152 bytes,with somewhere between 200
and 400 bytes of memory usage.
(I'm also assuming that reseed events are comparatively uncommon. If
that's wrong, oops!)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17799#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list