[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
TFC 0.5.5 out
TFC 0.5.5 is now out
I found another vulnerability in the constant transmission feature;
between each long message only one command would be sent at most. This
issue has now been fixed.
After a request, I added further message authentication for CEV: In
addition to GMAC it now does encrypt-then-MAC style authentication using
HMAC-SHA2-512 (512-bit key) and SHA3-512 MAC (1144-bit key) before GCM
authenticates and decrypts the ciphertext.
I upgraded all keys to 512-bit ones so cyclic hashing of keys won't
reduce security over long period of time (there is no key negotiation in
TFC).
I also upgraded hashes from Keccak-256 to Keccak-512 and at the same
time the Keccak-CTR key size was upgraded to 512-bits. So 1280-bits of
symmetric key security in total.
As for key generation, CEV now has constant 2kHz sampling speed (1.5M
samples are loaded in total), three vN whitening passes and between each
of those, Keccak-512 compression with 2:1 ratio (1024 bits in, 512 out).
User can now input different entropy from keyboard for each of the eight
512-bit keys generated.
Also fixed lots of bugs and typos, and as usual, updated whitepaper and
manual where necessary.
UI was tweaked slightly: I added cleaner completion messages and some
startup animation for the lulz (disable option available in settings).
Full update log:
https://github.com/maqp/tfc-cev/blob/master/0.5.5%20update%20log.txt