Public-key cryptography in Tor and pluggable transports
Tanja Lange
Technische Universiteit Eindhoven
09 June 2016
1 / 17
Public-key cryptography in Tor and pluggable transports Tanja Lange - - PowerPoint PPT Presentation
Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016 1 / 17 Tor Attend Rogers talk on Friday. 2 / 17 Motivation Network Sender Receiver Eavesdropper
1 / 17
2 / 17
3 / 17
4 / 17
5 / 17
6 / 17
◮ Censor can cut all communication. ◮ Censor can cut all https traffic. 6 / 17
◮ Censor can cut all communication. ◮ Censor can cut all https traffic.
6 / 17
◮ Censor can cut all communication. ◮ Censor can cut all https traffic.
6 / 17
7 / 17
◮ Points can have multiple preimages. ◮ Points can have no preimages. ◮ Really hard to get uniform distribution (reject with probability
◮ Finding all the preimages means point counting.
◮ Each x ∈ I
◮ Get uniformity by switching to right curve. ◮ Requires two keys for everything (doubles key size). ◮ Problems with parties choose non-matching curves in DH. 8 / 17
9 / 17
10 / 17
◮ x = −A, ◮ if y = 0 then x = 0, and ◮ −ux(x + A) = .
11 / 17
12 / 17
13 / 17
◮ Use Tor to deal with stupid network configuration (e.g. at
◮ Local chat services using Ricochet. ◮ Collaborative servers (small group, not public). ◮ File sharing, online shops, . . . ◮ Secure drop sites.
14 / 17
15 / 17
◮ She doesn’t want to get a new certificate for A′. ◮ She doesn’t want to distribute new public keys. ◮ She wants to be able to decrypt after the trip, but not keep
15 / 17
16 / 17
17 / 17