SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Tor Switches to New Counter Galois Onion Relay Encryption Algorithm
Date    Sunday November 30, @02:17PM
Author    janrinok
Topic   
from the dept.
https://soylentnews.org/article.pl?sid=25/11/26/1550227

An Anonymous Coward writes:

https://www.bleepingcomputer.com/news/security/tor-switches-to-new-counter-galois-onion-relay-encryption-algorithm/

Tor has announced improved encryption and security for the circuit traffic by replacing the old tor1 relay encryption algorithm with a new design called Counter Galois Onion (CGO).

One reason behind this decision is to make the network more resilient against modern traffic-interception attacks that could compromise data security and undermine Tor user anonymity.

The Tor network is a global system consisting of thousands of relays that create a circuit for data packets to travel to their destination through three relays (entry, middle, and exit), each hop adding a layer of encryption (onion routing).

Users of the Tor Browser, a hardened version of Firefox built for browsing the Tor network, benefit from this onion routing to communicate privately, share or access information anonymously, bypass censorship, and evade ISP-level tracking.

Typically, Tor is used by dissidents, activists, whistleblowers, journalists, researchers, and generally privacy-conscious people, including cybercriminals looking to access darknet markets.

As the Tor team explains in an announcement, Tor1 was developed at a time when cryptography was far less advanced than today, and the standards have improved significantly since then.

One issue with the tor1 design is that it uses AES-CTR encryption without hop-by-hop authentication, which leads to malleable relay encryption. This means that an adversary could modify traffic between relays they control and observe predictable changes - a tagging attack that is part of the internal covert channel class of attacks.

Another problem is that tor1 uses partial forward secrecy by reusing the same AES keys throughout a circuit's lifetime, enabling decryption in the event of key theft.

A third security concern is that tor1 uses a 4-byte SHA-1 digest for cell authentication, giving attackers a one-in-4 billion probability to forge a cell without being detected.

The Tor project notes that only the first attack in the list is more severe, and the last two examples were mentioned "for the sake of completeness."

CGO addresses the above problems. It is built on a Rugged Pseudorandom Permutation (RPRP) construction called UIV+, designed by cryptography researchers Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, and Martijn Stam.

Tor says that this system has been verified to meet specific security requirements, including protection against "tagging resistance, immediate forward secrecy, longer authentication tags, limited bandwidth overhead, relatively efficient operation, and modernized cryptography."

Specifically, CGO improves on the following compared to Tor1:

The project maintainers say that adding CGO into the C Tor implementation and its Rust-based client, Arti, is underway, and the feature is marked as experimental. Pending work includes the addition of onion service negotiation and performance optimizations.

Tor browser users do not need to do anything to benefit from CGO, as the change will happen automatically once the new system can be fully deployed. However, a timeline for when it will become the default option has not been provided.


Original Submission

Links

  1. "more resilient" - https://blog.torproject.org/introducing-cgo/
  2. "internal covert channel" - https://spec.torproject.org/proposals/344-protocol-info-leaks.html#11-highly-severe-internal-covert-channel-vectors
  3. "designed by cryptography researchers" - https://eprint.iacr.org/2025/583
  4. "verified" - http://eprint.iacr.org/2025/2017
  5. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=67232

© Copyright 2025 - SoylentNews, All Rights Reserved

printed from SoylentNews, Tor Switches to New Counter Galois Onion Relay Encryption Algorithm on 2025-12-10 17:03:24