Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
In my last post, I hinted at a revolution coming to the Tor network. But for those of you who like to know "how it works under the hood," I’ve prepared a deeper analysis. The change in the relay encryption algorithm from the veteran "tor1" to Counter Galois Onion (CGO) is a fascinating piece of engineering.
Here is exactly what is changing and why you should be excited (or at least feel safer).
The old protocol, which the creators have only now named "tor1" (just to have something to put in the documentation for its deprecation), was created around 2002. It was based on the AES-128-CTR stream cipher.
The main problem was the so-called malleability of the stream cipher. In counter mode (CTR), the ciphertext ($C$) is created by XORing the keystream ($S$) with the plaintext ($P$), i.e., $C = S \oplus P$. This is elementary school math that served as the nail in the coffin for anonymity:
Worse still, users often confused the effects of these attacks (dropped connections) with DDoS attacks, causing false alarms in Tor client logs.
The new standard, Counter Galois Onion (CGO), is based on the UIV+ construction and the concept of Rugged Pseudorandom Permutation (RPRP). Instead of a simple stream, we are dealing with a wide-block cipher design that is resistant to malleability.
How does it work in practice?
Update function. If someone steals the key at minute 5 of the connection, they cannot decrypt what happened in minute 4.This is perhaps the biggest surprise. Usually, "safer" means "slower." Here, we have an interesting anomaly. The old protocol used SHA-1 for integrity verification. SHA-1 is slow. CGO eliminates this overhead.
Benchmarks (conducted on Intel Cascade Lake processors) show the following results:
However, the creators reassure us—the gain at the edges of the network is more important, and modern processors with AES-NI and PCLMUL instructions (used to optimize CGO) will handle the overhead on intermediate nodes.
The implementation of CGO is already ready in Arti (the Tor client written in Rust) as well as in the classic C implementation. The next steps include enabling CGO by default in Arti and deploying CGO negotiation for onion services.
It is a fascinating moment where we see how academic cryptography (research by Degabriele, Melloni, Münch, Stam) is realistically fixing the internet.
Aleksander
Sources:

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
The modern digital ecosystem operates under an unprecedented convergence of legal requirements and technological challenges. The General Data Protection Regulation (GDPR), which came into effect in May 2018, has permanently changed the way organizations must perceive information security.
Eight critical vulnerabilities in a single year. We analyze how sophisticated APT groups exploit the V8 engine and why traditional sandboxing is no longer enough in 2025.
IAM misconfiguration is the leading cause of cloud incidents. Discover differences between AWS, Azure, and GCP in Shared Responsibility Model, how to implement Zero Trust, avoid "toxic combinations" of permissions, secure CMK keys, and automate CSPM for NIS2 compliance.
Loading comments...