<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p>Could you clarify what are Tor knockoffs? Haven't heard about it
before and can't find anything useful with these keywords myself.</p>
<p>
<blockquote type="cite">You cannot use a stream cipher for onion
encryption in most mix networks<br>
designs, only a wide-block cipher like AEZ, Lioness (too slow),
or most<br>
likely the up-coming HHFHFHFH. </blockquote>
I've not explored mix networks too much, so my understanding is
limited, could you give some links where I can read why?<br>
</p>
<p><br>
</p>
<p>Just to give a bit more context, I'm going to build a network
that will only have something similar to Tor's hidden services,
namely all of the traffic will be inside of the network.</p>
<p>Also bandwidth requirements are expected to be very low and while
latency requirements are quite high (only occasionally), it is not
critical if there would be several seconds delay sometimes.<br>
</p>
<pre class="moz-signature" cols="0">Sincerely, Nazar Mokrynskyi
github.com/nazar-pc</pre>
<div class="moz-cite-prefix">On 10/12/17 6:28 PM, Jeff Burdges
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:1507822106.8341.243.camel@gnunet.org">
<pre wrap="">
You could maybe do this for Tor knockoffs, but not for anonymity systems
more generally. And actually nobody but I2P does Tor "knockoffs"
anyways.
On Tue, 2017-10-10 at 14:18 +0300, Nazar Mokrynskyi wrote:
</pre>
<blockquote type="cite">
<pre wrap="">* choose your crypto (like Noise IK for end-to-end encryption and some
stream cipher for onion-like non-authenticated layered encryption)
</pre>
</blockquote>
<pre wrap="">
You cannot use a stream cipher for onion encryption in most mix networks
designs, only a wide-block cipher like AEZ, Lioness (too slow), or most
likely the up-coming HHFHFHFH.
Jeff
</pre>
</blockquote>
</body>
</html>