[146421] in cryptography@c2.net mail archive
Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?
daemon@ATHENA.MIT.EDU (Jonathan Thornburg)
Tue Aug 27 21:55:57 2013
X-Original-To: cryptography@metzdowd.com
Date: Tue, 27 Aug 2013 21:47:04 -0400 (EDT)
From: Jonathan Thornburg <jthorn@astro.indiana.edu>
To: "Perry E. Metzger" <perry@piermont.com>
In-Reply-To: <20130827214159.725bd9d9@jabberwock.cb.piermont.com>
Cc: Cryptography List <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> Say that you want to distribute a database table consisting of human
> readable IDs, cryptographic keys and network endpoints for some
> reason. Say you want it to scale to hundreds of millions of users.
This sounds remarkably like a description of DNSSEC.
Assuming it were widely deployed, would DNSSEC-for-key-distribution
be a reasonable way to store
email_address --> public_key
mappings?
--
-- "Jonathan Thornburg <jthorn@astro.indiana.edu>
Dept of Astronomy & IUCSS, Indiana University, Bloomington, Indiana, USA
"There was of course no way of knowing whether you were being watched
at any given moment. How often, or on what system, the Thought Police
plugged in on any individual wire was guesswork. It was even conceivable
that they watched everybody all the time." -- George Orwell, "1984"
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography