From 8d6a79cac58d376842fdd7345f3ac167edcb7312 Mon Sep 17 00:00:00 2001 From: zzz <zzz@mail.i2p> Date: Tue, 28 Apr 2020 20:52:12 +0000 Subject: [PATCH] minor updates --- i2p2www/pages/site/docs/how/elgamal-aes.html | 12 ++++++++++-- .../spec/proposals/144-ecies-x25519-aead-ratchet.rst | 9 ++++++--- 2 files changed, 16 insertions(+), 5 deletions(-) diff --git a/i2p2www/pages/site/docs/how/elgamal-aes.html b/i2p2www/pages/site/docs/how/elgamal-aes.html index 70ae9b724..dd17122c2 100644 --- a/i2p2www/pages/site/docs/how/elgamal-aes.html +++ b/i2p2www/pages/site/docs/how/elgamal-aes.html @@ -1,7 +1,7 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}ElGamal/AES + SessionTag Encryption{% endtrans %}{% endblock %} -{% block lastupdated %}{% trans %}January 2016{% endtrans %}{% endblock %} -{% block accuratefor %}0.9.24{% endblock %} +{% block lastupdated %}April 2020{% endblock %} +{% block accuratefor %}0.9.46{% endblock %} {% block content %} <h2>{% trans %}Overview{% endtrans %}</h2> <p>{% trans -%} @@ -342,6 +342,14 @@ See the <a href="{{ i2cpspec }}#msg_SendMessageExpires">I2CP Send Message Expire <h2 id="future">{% trans %}Future Work{% endtrans %}</h2> + +<p><b>Note:</b> +ElGamal/AES+SessionTags is being replaced with ECIES-X25519-AEAD-Ratchet (Proposal 144). +The issues and ideas referenced below have been incorporated +into the design of the new protocol. +The following items will not be addressed in ElGamal/AES+SessionTags. +</p> + <p>{% trans -%} There are many possible areas to tune the Session Key Manager's algorithms; some may interact with the streaming library behavior, or have significant diff --git a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst index bb1952825..9e89cf4cf 100644 --- a/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst +++ b/i2p2www/spec/proposals/144-ecies-x25519-aead-ratchet.rst @@ -5,7 +5,7 @@ ECIES-X25519-AEAD-Ratchet :author: zzz, chisana, orignal :created: 2018-11-22 :thread: http://zzz.i2p/topics/2639 - :lastupdated: 2020-04-27 + :lastupdated: 2020-04-28 :status: Open :target: 0.9.46 :implementedin: 0.9.46 @@ -3512,11 +3512,14 @@ Storage The sender generates tags and keys on the fly, so there is no storage. This cuts overall storage requirements in half compared to ElGamal/AES. ECIES tags are 8 bytes instead of 32 for ElGamal/AES. -This cuts overall storage requiremens by another factor of 4. +This cuts overall storage requirements by another factor of 4. Per-tag session keys are not stored at the receiver except for "gaps", which are minimal for reasonable loss rates. -Therefore, the total space savings vs. ElGamal/AES is a factor of 8, or 87%. +The 33% reduction in tag expiration time creates another 33% savings, +assuming short session times. + +Therefore, the total space savings vs. ElGamal/AES is a factor of 10.7, or 92%. -- GitLab