Changes between Version 64 and Version 65 of Crypto/CurrentSpecs


Ignore:
Timestamp:
Feb 5, 2013, 8:42:15 PM (6 years ago)
Author:
zzz
Comment:

add more info on current usage of symm/asymm/mac/hash

Legend:

Unmodified
Added
Removed
Modified
  • Crypto/CurrentSpecs

    v64 v65  
    66
    77|| '''Cipher''' || '''Used lengths''' || '''Security''' || '''Comments'''||
    8 || AES-CBC [8] || 256 || Good [5] ||  A good choice due to common support for hardware acceleration??? Really? We don't support hardware acceleration. Never used alone, always with ElG+SessionTag [8] ||
     8|| AES-CBC [8] || 256 || Good [5] ||  A good choice due to common support for hardware acceleration??? Really? We don't support hardware acceleration. Never used alone, always with ElG+SessionTag [8] Notes about padding in [8] are incorrect and to be fixed (see trac ticket) ||
    99
    1010=== Asymmetric ===
     
    1313|| !ElGamal [8] || 2048 || >Poor [5]???|| We use "short exponent" [8] ||
    1414
     15=== MAC ===
     16|| '''Cipher''' || '''Security''' || '''Implementability''' || '''Comments''' ||
     17|| HMAC-MD5-128 || Good [5] || || nonstandard, used in SSU ||
     18
    1519=== Hashes ===
    1620
    1721|| '''Cipher''' || '''Used lengths''' || '''Security''' || '''Comments'''||
    18 || SHA256 [8] || 256 || Good [5] || Slow compared to SHA-3 ||
     22|| SHA256 [8] || 256 || Good [5] || Slow compared to SHA-3. Used everywhere. ||
    1923
    2024=== Key Exchange ===
    2125
    2226|| '''Cipher''' || '''Used lengths''' || '''Security''' || '''Comments'''||
    23 || DH [8] || 2048 ||  ||  ||
     27|| DH [8] || 2048 ||  ||  Both NTCP and SSU ||
    2428
    2529=== Signatures ===
     
    4145|| Streaming message signing || DSA || ??? || || ||
    4246|| SUD signing || DSA || Years and years || 99% verif. || ||
    43 || Tunnel Build Messages || ElG ||  ||  || ||
     47|| Tunnel Build Messages [8] || ElG ||  ||  || ||
    4448|| NetDB Lookups / Stores [8] || ElG/AES+SessionTag ||  ||  || Only some are encrypted [8] ||
     49|| End-to-End Encryption [8] || ElG/AES+SessionTag ||  ||  ||  ||
     50|| Transport key exchange [8] || DH ||  ||  ||  Both NTCP and SSU ||
     51|| NTCP Transport encryption [8] || AES ||  ||  ||   ||
     52|| SSU Transport encryption [8] || AES ||  ||  || With nonstandard HMAC-MD5-128 [8]   ||
     53|| Hashes [8] || SHA-256 ||  ||  || Used as the netdb keys and would be very disruptive to change [8]   ||
     54
    4555
    4656== Potential new ciphers ==
     
    8797[6] [wiki:Crypto/OpenSSLBench OpenSSL Benchmark] [[BR]]
    8898[7] http://en.wikipedia.org/wiki/RIPEMD - Citation needed [[BR]]
    89 [8] http://www.i2p2.i2p/how_cryptography [[BR]]
     99[8] http://www.i2p2.i2p/how_cryptography and see more references there [[BR]]