diff --git a/www.i2p2/pages/how_cryptography.html b/www.i2p2/pages/how_cryptography.html index 0ab3f628..c1e4688f 100644 --- a/www.i2p2/pages/how_cryptography.html +++ b/www.i2p2/pages/how_cryptography.html @@ -2,7 +2,7 @@ {% block title %}Low-level Cryptography Details{% endblock %} {% block content %}

-Updated January 2011, current as of router version 0.8.3 +Updated August 2011, current as of router version 0.8.7

This page specifies the low-level details of the cryptography in I2P.

@@ -166,7 +166,7 @@ as a part of ElGamal/AES+SessionTag For encryption of periodic tunnel test messages sent from the router to itself, through its own tunnels.

-We use 256 bit AES in CBC mode. +We use AES with 256 bit keys and 128 bit blocks in CBC mode. The padding used is specified in IETF RFC-2313 (PKCS#5 1.5, section 8.1 (for block type 02)). In this case, padding exists of pseudorandomly generated octets to match 16 byte blocks. Specifically, see @@ -175,14 +175,12 @@ and the Cryptix AES [implementation], as well as the padding, found in the ElGamalAESEngine.getPadding function. + + + +

Obsolescence

The vulnerability of the network to an AES attack and the impact of transitioning to a longer bit length is to be studied. @@ -397,6 +398,13 @@ router's DSA key, plus each network message has their own hash for local integri checking.

See the SSU specification for details. +

+WARNING - I2P's HMAC-HD5-128 used in SSU is apparently non-standard. +Apparently, an early version of SSU used HMAC-SHA256, and then it was switched +to MD5-128 for performance reasons, but left the 32-byte buffer size intact. +See HMACGenerator.java and +the 2005-07-05 status notes +for details.

References

diff --git a/www.i2p2/pages/papers.html b/www.i2p2/pages/papers.html index 453dc53c..b8a6ea18 100644 --- a/www.i2p2/pages/papers.html +++ b/www.i2p2/pages/papers.html @@ -139,6 +139,17 @@ Master's Thesis, TU-Munich, March 28, 2011. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P, Michael Hermann, Christian Grothoff. Presented at PET Symposium, Waterloo Canada, July 27, 2011. +presentation slides (odp) + +
  • +Common Darknet Weaknesses +(Youtube Video) +Adrian Crenshaw, AIDE, July 11-15, 2011. + +
  • +Short garlic routing animation +(Youtube Video) +Adrian Crenshaw.
  • Cipherspaces/Darknets: An Overview Of Attack Strategies,