The Onion Network (Tor) has long been synonymous with accessing the dark web, though its primary purpose is to safeguard user privacy. Unsurprisingly, various forms of online criminal activity have also exploited Tor’s privacy-preserving properties to enhance anonymity.
Yet Tor is far from invulnerable. In past incidents, certain organizations deployed large numbers of malicious Tor nodes to mount attacks targeting the network’s most fundamental — and also its oldest — routing protocol, the Tor1 algorithm. Tor1 is responsible for encrypting data and transmitting it through multiple nodes along a user’s Tor circuit.
Each client shares a symmetric key with every relay in its circuit. Tor uses these keys to encrypt outgoing messages, stripping away one layer of encryption at each hop until the data reaches the exit relay and ultimately its destination on the open internet.
However, the design of the Tor1 algorithm exposes it to several risks, the most notable being tagging attacks. In such an attack, an adversary manipulates traffic at one relay in a way that creates predictable modifications as the data travels through the circuit, allowing a sophisticated attacker to trace the destination directly.
While tagging is the algorithm’s most prominent flaw, Tor1 suffers from additional weaknesses. It repeatedly reuses the same AES key throughout an entire encrypted circuit, and its 4-byte authenticator makes it possible — with odds of one in four billion — for a forged relay cell to slip through without detection.
To address these deficiencies, the Tor Project has designed a new encryption scheme called the Counter Galois Onion (CGO) algorithm. CGO strengthens Tor’s security by protecting the entire encryption process: any attempt to tamper with a message renders that message — and all subsequent messages in the same circuit — irrecoverable.
CGO has been implemented in Arti, the Rust-based Tor client. Because Arti’s Rust relays are still under active development, the Tor Project has also created an AC version to ensure compatibility with the broader relay infrastructure.
As for when Tor Browser users will be able to rely on CGO, the timeline remains uncertain. The Tor team has offered no definitive release schedule and is currently focused on optimizing the algorithm for modern CPUs. Although CGO may carry some performance overhead compared to Tor1, the team believes significant optimization potential remains.
Related Posts:
- Tor Browser and the Dark Web: A Beginner’s Guide to Anonymity and Security
- Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign Unveiled