|
@@ -38,7 +38,7 @@ when do we rotate which keys (tls, link, etc)?
|
|
0.2. Security parameters
|
|
0.2. Security parameters
|
|
|
|
|
|
Tor uses a stream cipher, a public-key cipher, the Diffie-Hellman
|
|
Tor uses a stream cipher, a public-key cipher, the Diffie-Hellman
|
|
- protocol, and and a hash function.
|
|
|
|
|
|
+ protocol, and a hash function.
|
|
|
|
|
|
KEY_LEN -- the length of the stream cipher's key, in bytes.
|
|
KEY_LEN -- the length of the stream cipher's key, in bytes.
|
|
|
|
|