Tier Nolan [ARCHIVE] on Nostr: 📅 Original date posted:2016-03-23 📝 Original message:There is probably not much ...
📅 Original date posted:2016-03-23
📝 Original message:There is probably not much loss due to per message encryption. Even if a
MITM determined that a message was an inv message (or bloom filter
message), it wouldn't be able to extract much information. Since the
hashes in those messages are fixed size, there is very little leakage.
You could make it so that the the encryption messages effectively create a
second data stream and break/weaken the link between message size and
wrapped message size. This requires state though, so there is a complexity
tradeoff.
There is no real need to include an IV, since you are including a 32 byte
context hash. The first 16 bytes of the context hash could be used as IV.
In terms of generating the context hash, it would be easier to make it
linear.
context_hash_n = SHA256(context_hash_(n-1) | message_(n-1))
As the session gets longer, both nodes would have to do more and more
hashing to compute the hash of the entire conversation.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20160323/64f754da/attachment.html>
Published at
2023-06-07 17:49:55Event JSON
{
"id": "5b0124ec3260bbf10018f4680cf1d0526709624dfe4169b7013b29376118027f",
"pubkey": "46986f86b97cc97829a031b03209644d134b939d0163375467f0b1363e0d875e",
"created_at": 1686160195,
"kind": 1,
"tags": [
[
"e",
"1c87d471b2f2da141b64e0a9c480b3ca53986e57331a196cd0234d6c8fb75484",
"",
"root"
],
[
"e",
"ac3d19b7d3b8ebc8252a2080139d2737e8ff41075ea8714e3dc003cc5ad35ce7",
"",
"reply"
],
[
"p",
"9a463e0fab8963b013698c15a0f2449d19c97f3b88458e5874095b5006df9a0c"
]
],
"content": "📅 Original date posted:2016-03-23\n📝 Original message:There is probably not much loss due to per message encryption. Even if a\nMITM determined that a message was an inv message (or bloom filter\nmessage), it wouldn't be able to extract much information. Since the\nhashes in those messages are fixed size, there is very little leakage.\n\nYou could make it so that the the encryption messages effectively create a\nsecond data stream and break/weaken the link between message size and\nwrapped message size. This requires state though, so there is a complexity\ntradeoff.\n\nThere is no real need to include an IV, since you are including a 32 byte\ncontext hash. The first 16 bytes of the context hash could be used as IV.\n\nIn terms of generating the context hash, it would be easier to make it\nlinear.\n\ncontext_hash_n = SHA256(context_hash_(n-1) | message_(n-1))\n\nAs the session gets longer, both nodes would have to do more and more\nhashing to compute the hash of the entire conversation.\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/bitcoin-dev/attachments/20160323/64f754da/attachment.html\u003e",
"sig": "9501e0794bb9e09352c14d4ac0964bad34b969e024e26e8c3b93e75b063e5278166ccc20b4c60e5762a7b4ba05a2472032bebb63ab286287cf066f0ac40ab39b"
}