> My knowledge of the field is pretty spotty in general as I've never paid
much
> attention up until now -- mostly I know about how people have built DHTs
in
> non-hostile environments. I'm close enough to starting from scratch that I
don't
> know yet what I don't know.

I studied such systems intensely, and designed some
(http://en.wikipedia.org/wiki/Peer_Name_Resolution_Protocol). Using a
distributed hash table securely is really hard. The basic idea of DHT is
that information is spread on the network based on matches between the hash
of a resource identifier and the hash of a node identifier. All nodes are
effectively relying on every other node. In an open network, that is pretty
much equivalent to "relying on the goodness of strangers." You can be sure
that if our buddies at the NSA set up to watch the content of a DHT, they
will succeed.

-- Christian Huitema




_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to