TOR Extended 1 - Applied Cryptography
0:00 - 0:04And the answer is all of these topics I used in TOR.
0:04 - 0:06Counter mode encryption is used for the cells
0:06 - 0:09to relay messages. Cryptographic hashing, Diffie-Hellman
0:09 - 0:12key exchange and RSA encryption are all used in cell
0:12 - 0:16creation and key exchange and TLS is used by all the onion
0:16 - 0:19routers to maintain connections between each other.
- TOR Extended 1 - Applied Cryptography
- Video Language:
- CS387 - Applied Cryptography