hi, Since they are using symmetric keys, for a network of 'n' nodes, each node need to know the secret key that they share with the remaining (n-1) nodes.Total number of symmetric keys that need to be distributed is [n*(n-1)]/2. Key management is harder when they network gets larger.
Sarath. --- Sunder <[EMAIL PROTECTED]> wrote: > > > http://www.wired.com/news/print/0,1294,64464,00.html > Onion Routing Averts Prying Eyes > By Ann Harrison > > Story location: > http://www.wired.com/news/privacy/0,1848,64464,00.html > > 02:00 AM Aug. 05, 2004 PT > > Computer programmers are modifying a communications > system, originally > developed by the U.S. Naval Research Lab, to help > Internet users surf the > Web anonymously and shield their online activities > from corporate or > government eyes. > > <SNIP> > > The Navy is financing the development of a > second-generation onion-routing > system called Tor, which addresses many of the flaws > in the original > design and makes it easier to use. The Tor client > behaves like a SOCKS > proxy (a common protocol for developing secure > communication services), > allowing applications like Mozilla, SSH and FTP > clients to talk directly > to Tor and route data streams through a network of > onion routers, without > long delays. > > <SNIP> > > > ----------------------Kaos-Keraunos-Kybernetos--------------------------- > + ^ + :"War is Peace > /|\ > \|/ : Freedom is Slavery > /\|/\ > <--*-->: Ignorance is Strength > \/|\/ > /|\ : Bush is President" - Bret Feinblatt > \|/ > + v + : > > -------------------------------------- > http://www.sunder.net ------------ > > _______________________________ Do you Yahoo!? Express yourself with Y! Messenger! Free. Download now. http://messenger.yahoo.com
