Original Article Text

Click to Toggle View

Tor switches to new Counter Galois Onion relay encryption algorithm. Tor has announced improved encryption and security for the circuit traffic by replacing the old tor1 relay encryption algorithm with a new design called Counter Galois Onion (CGO). One reason behind this decision is to make the network more resilient against modern traffic-interception attacks that could compromise data security and undermine Tor user anonymity. The Tor network is a global system consisting of thousands of relays that create a circuit for data packets to travel to their destination through three relays (entry, middle, and exit), each hop adding a layer of encryption (onion routing). Users of the Tor Browser, a hardened version of Firefox built for browsing the Tor network, benefit from this onion routing to communicate privately, share or access information anonymously, bypass censorship, and evade ISP-level tracking. Typically, Tor is used by dissidents, activists, whistleblowers, journalists, researchers, and generally privacy-conscious people, including cybercriminals looking to access darknet markets. As the Tor team explains in an announcement, Tor1 was developed at a time when cryptography was far less advanced than today, and the standards have improved significantly since then. One issue with the tor1 design is that it uses AES-CTR encryption without hop-by-hop authentication, which leads to malleable relay encryption. This means that an adversary could modify traffic between relays they control and observe predictable changes - a tagging attack that is part of the internal covert channel class of attacks.  Another problem is that tor1 uses partial forward secrecy by reusing the same AES keys throughout a circuit’s lifetime, enabling decryption in the event of key theft. A third security concern is that tor1 uses a 4-byte SHA-1 digest for cell authentication, giving attackers a one-in-4 billion probability to forge a cell without being detected. The Tor project notes that only the first attack in the list is more severe, and the last  two examples were mentioned "for the sake of completeness." Introducing CGO CGO addresses the above problems. It is built on a Rugged Pseudorandom Permutation (RPRP) construction called UIV+, designed by cryptography researchers Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, and Martijn Stam. Tor says that this system has been verified to meet specific security requirements, including protection against "tagging resistance, immediate forward secrecy, longer authentication tags, limited bandwidth overhead, relatively efficient operation, and modernized cryptography." Specifically, CGO improves on the following compared to Tor1: Overall, CGO is a modern, research-based encryption and authentication system that addresses many of  Tor1’s problems without incurring large bandwidth penalties. The project maintainers say that adding CGO into the C Tor implementation and its Rust-based client, Arti, is underway, and the feature is marked as experimental. Pending work includes the addition of onion service negotiation and performance optimizations. Tor browser users do not need to do anything to benefit from CGO, as the change will happen automatically once the new system can be fully deployed. However, a timeline for when it will become the default option has not been provided. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.

Daily Brief Summary

VULNERABILITIES // Tor Network Enhances Security with New Encryption Algorithm CGO

Tor has introduced the Counter Galois Onion (CGO) algorithm to replace the outdated tor1 encryption, improving resilience against traffic-interception attacks and enhancing user anonymity.

The Tor network, crucial for privacy-conscious users, relies on onion routing through multiple relays, with each hop adding a layer of encryption to protect data.

The previous tor1 algorithm had vulnerabilities, including malleable relay encryption and partial forward secrecy, which could be exploited by adversaries for traffic modification.

CGO addresses these issues with modern cryptographic standards, offering tagging resistance, immediate forward secrecy, and longer authentication tags without significant bandwidth impact.

The new system is based on the UIV+ construction, verified for security requirements, and aims to ensure robust encryption and authentication for Tor users.

Implementation of CGO in the C Tor and Rust-based Arti clients is underway, with users benefiting automatically once fully deployed, although a timeline for default adoption is not yet specified.

This upgrade reflects Tor's commitment to maintaining a secure platform for users, including activists, journalists, and others requiring privacy and anonymity online.