Could you clarify what are Tor knockoffs? Haven't heard about it before and 
can't find anything useful with these keywords myself.

> You cannot use a stream cipher for onion encryption in most mix networks
> designs, only a wide-block cipher like AEZ, Lioness (too slow), or most
> likely the up-coming HHFHFHFH. 
I've not explored mix networks too much, so my understanding is limited, could 
you give some links where I can read why?


Just to give a bit more context, I'm going to build a network that will only 
have something similar to Tor's hidden services, namely all of the traffic will 
be inside of the network.

Also bandwidth requirements are expected to be very low and while latency 
requirements are quite high (only occasionally), it is not critical if there 
would be several seconds delay sometimes.

Sincerely, Nazar Mokrynskyi
github.com/nazar-pc

On 10/12/17 6:28 PM, Jeff Burdges wrote:
> You could maybe do this for Tor knockoffs, but not for anonymity systems
> more generally.  And actually nobody but I2P does Tor "knockoffs"
> anyways.
>
> On Tue, 2017-10-10 at 14:18 +0300, Nazar Mokrynskyi wrote:
>> * choose your crypto (like Noise IK for end-to-end encryption and some
>> stream cipher for onion-like non-authenticated layered encryption)
> You cannot use a stream cipher for onion encryption in most mix networks
> designs, only a wide-block cipher like AEZ, Lioness (too slow), or most
> likely the up-coming HHFHFHFH. 
>
> Jeff
>
>
_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to