diff --git a/i2p2www/pages/site/docs/how/elgamal-aes.html b/i2p2www/pages/site/docs/how/elgamal-aes.html index 70ae9b724877894ac39d3513d379a12ea1e6a53c..dd17122c25a0bcfaccbf8dd70129b6fd1bdb4ec2 100644 --- a/i2p2www/pages/site/docs/how/elgamal-aes.html +++ b/i2p2www/pages/site/docs/how/elgamal-aes.html @@ -1,7 +1,7 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}ElGamal/AES + SessionTag Encryption{% endtrans %}{% endblock %} -{% block lastupdated %}{% trans %}January 2016{% endtrans %}{% endblock %} -{% block accuratefor %}0.9.24{% endblock %} +{% block lastupdated %}April 2020{% endblock %} +{% block accuratefor %}0.9.46{% endblock %} {% block content %} <h2>{% trans %}Overview{% endtrans %}</h2> <p>{% trans -%} @@ -342,6 +342,14 @@ See the <a href="{{ i2cpspec }}#msg_SendMessageExpires">I2CP Send Message Expire <h2 id="future">{% trans %}Future Work{% endtrans %}</h2> + +<p><b>Note:</b> +ElGamal/AES+SessionTags is being replaced with ECIES-X25519-AEAD-Ratchet (Proposal 144). +The issues and ideas referenced below have been incorporated +into the design of the new protocol. +The following items will not be addressed in ElGamal/AES+SessionTags. +</p> + <p>{% trans -%} There are many possible areas to tune the Session Key Manager's algorithms; some may interact with the streaming library behavior, or have significant diff --git a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst index bb1952825a2ab8166462e943a62b811e71e3d52f..9e89cf4cff2ded184dd957b63a1e675e3f6a408c 100644 --- a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst +++ b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst @@ -5,7 +5,7 @@ ECIES-X25519-AEAD-Ratchet :author: zzz, chisana, orignal :created: 2018-11-22 :thread: http://zzz.i2p/topics/2639 - :lastupdated: 2020-04-27 + :lastupdated: 2020-04-28 :status: Open :target: 0.9.46 :implementedin: 0.9.46 @@ -3512,11 +3512,14 @@ Storage The sender generates tags and keys on the fly, so there is no storage. This cuts overall storage requirements in half compared to ElGamal/AES. ECIES tags are 8 bytes instead of 32 for ElGamal/AES. -This cuts overall storage requiremens by another factor of 4. +This cuts overall storage requirements by another factor of 4. Per-tag session keys are not stored at the receiver except for "gaps", which are minimal for reasonable loss rates. -Therefore, the total space savings vs. ElGamal/AES is a factor of 8, or 87%. +The 33% reduction in tag expiration time creates another 33% savings, +assuming short session times. + +Therefore, the total space savings vs. ElGamal/AES is a factor of 10.7, or 92%.