[146360] in cryptography@c2.net mail archive
Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?
daemon@ATHENA.MIT.EDU (Christian Huitema)
Sun Aug 25 19:50:34 2013
X-Original-To: cryptography@metzdowd.com
From: "Christian Huitema" <huitema@huitema.net>
To: "'Perry E. Metzger'" <perry@piermont.com>,
"'Ralph Holz'" <ralph-cryptometzger@ralphholz.de>
In-Reply-To: <20130825193508.450964fc@jabberwock.cb.piermont.com>
Date: Sun, 25 Aug 2013 16:42:57 -0700
Cc: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
> My knowledge of the field is pretty spotty in general as I've never paid
much
> attention up until now -- mostly I know about how people have built DHTs
in
> non-hostile environments. I'm close enough to starting from scratch that I
don't
> know yet what I don't know.
I studied such systems intensely, and designed some
(http://en.wikipedia.org/wiki/Peer_Name_Resolution_Protocol). Using a
distributed hash table securely is really hard. The basic idea of DHT is
that information is spread on the network based on matches between the hash
of a resource identifier and the hash of a node identifier. All nodes are
effectively relying on every other node. In an open network, that is pretty
much equivalent to "relying on the goodness of strangers." You can be sure
that if our buddies at the NSA set up to watch the content of a DHT, they
will succeed.
-- Christian Huitema
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography