Tor Introduces New CGO Encryption System to Strengthen Network Security

Published
Written by:
Rachita Jain
Rachita Jain
VPN Staff Editor

Tor has rolled out a major upgrade to its relay encryption system, replacing its long-used “tor1” algorithm with a new, research-backed method called Counter Galois Onion (CGO). The update aims to deliver stronger protection against modern interception and tagging attacks that could threaten user privacy across the Tor network.

A Complete Move Away From SHA-1 and tor1 Encryption

The shift marks a significant step forward for Tor, as SHA-1 has been removed entirely from relay encryption. Tor1, the previous system, relied heavily on AES-CTR encryption and lacked hop-by-hop authentication, which created opportunities for sophisticated attackers to manipulate relay traffic. This made it possible, at least in theory, for a compromised relay to insert predictable modifications into data as it moved across the network.

Tor says tor1 also reused AES keys within circuits, limiting forward secrecy, and relied on a short 4-byte SHA-1 digest for authentication. While Tor considers only the first issue to be critically important, all of them represent outdated cryptographic practices that need replacement.

CGO now becomes the successor, offering a design that has been developed and analyzed by cryptography researchers and built to meet more rigorous, modern standards.

How CGO Strengthens Tor’s Defenses

CGO is based on a Rugged Pseudorandom Permutation known as UIV+, which supports several new protections across the network. According to Tor, the new system includes:

Tor says these upgrades collectively improve confidentiality, authentication, and forward secrecy while keeping bandwidth overhead manageable.

What CGO Means for Tor Users

For everyday Tor Browser users, the upgrade will happen quietly in the background. No action is required, and the transition will roll out once integration and testing are complete.

CGO is being implemented in both the C-based Tor codebase and the Rust-powered Arti client. At the moment, it’s still considered experimental, with additional work planned around onion service negotiation and further performance tuning.

Tor has not yet confirmed when CGO will become the default encryption method across the network.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: