CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Tor Network Adopts Counter Galois Onion (CGO) Encryption Algorithm

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

The Tor Project has replaced the outdated tor1 relay encryption algorithm with the new Counter Galois Onion (CGO) encryption algorithm to enhance security and resilience against modern traffic-interception attacks. The CGO algorithm addresses vulnerabilities in tor1, including malleable relay encryption, partial forward secrecy, and weak authentication. The upgrade aims to protect user anonymity and data security by introducing tagging protection, immediate forward secrecy, and stronger authentication mechanisms. The Tor network, used by privacy-conscious individuals, dissidents, and journalists, relies on onion routing to ensure secure and anonymous communication. The transition to CGO is part of ongoing efforts to modernize Tor's cryptographic standards and mitigate potential covert channel attacks.

Timeline

  1. 25.11.2025 19:09 1 articles · 23h ago

    Tor Network Adopts Counter Galois Onion (CGO) Encryption Algorithm

    The Tor Project has replaced the outdated tor1 relay encryption algorithm with the new Counter Galois Onion (CGO) encryption algorithm to enhance security and resilience against modern traffic-interception attacks. The CGO algorithm addresses vulnerabilities in tor1, including malleable relay encryption, partial forward secrecy, and weak authentication. The upgrade aims to protect user anonymity and data security by introducing tagging protection, immediate forward secrecy, and stronger authentication mechanisms. The Tor network, used by privacy-conscious individuals, dissidents, and journalists, relies on onion routing to ensure secure and anonymous communication. The transition to CGO is part of ongoing efforts to modernize Tor's cryptographic standards and mitigate potential covert channel attacks.

    Show sources

Information Snippets