Skip to content

Replace rand.Read with Deterministic Nonces for Encryption #58

@Romero027

Description

@Romero027

Currently, EncryptSymphonyData generates random nonces for every packet using crypto/rand.Read. While the actual encryption (AES-GCM) utilizes CPU hardware acceleration (AES-NI), the nonce generation introduces a significant bottleneck.

Code pointer: https://github.com/appnet-org/arpc/blob/main/pkg/transport/encryption.go#L245

Switch to Deterministic Nonces (RPC ID-based) to eliminate the syscall overhead.

Check quic-go's implementation.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions