On Sun, 25 Aug 2013 16:42:57 -0700 "Christian Huitema"
<huit...@huitema.net> wrote:
> I studied such systems intensely, and designed some
> (http://en.wikipedia.org/wiki/Peer_Name_Resolution_Protocol). Using
> a distributed hash table securely is really hard. The basic idea of
> DHT is that information is spread on the network based on matches
> between the hash of a resource identifier and the hash of a node
> identifier. All nodes are effectively relying on every other node.
> In an open network, that is pretty much equivalent to "relying on
> the goodness of strangers." You can be sure that if our buddies at
> the NSA set up to watch the content of a DHT, they will succeed.

That is not my worry. Signing the data posted to the DHT can prevent
spoofing, querying it over a mix network or using a PIR protocol can
prevent eavesdropping. I'm more worried about various sorts of denial
of service attacks, or service being shut down by inadvertent
behavior.

Perry
-- 
Perry E. Metzger                pe...@piermont.com
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to