On Saturday 01 November 2003 06:19 pm, pineapple wrote:
> Uh oh!  I have another idea for this!  Another
> weakness with this attack is the assumption that is
> made about what constitutes a nearby key.  Right now
> all nodes arrange their estimator keyspace internally
> in the same manner.  Why?  The keys are encrypted so
> they are essentially random and therefore they have no
> relationship to each other based on their content.  My
> proposal is to randomly scramble the estimator
> keyspace using a function with a 1:1 mapping between
> the normal ordering and the new ordering scheme (I
> have no idea what function would be best for this).
> Now an attacker has no idea what key would be "near"
> the target key because every node would have it's own
> secret ordering for the estimator keyspace.  Two keys
> may be near each other on one node but very far apart
> on another.  Please keep in mind I'm talking about the
> estimator keyspace only.

Maybe just XOR with a randomly chosen node-private value. But won't this fubar 
routing and specialization, if each node has a different ordering in its 
routing? Or do I misunderstand what is meant by "estimator keyspace"?
-- 
"I love deadlines. I love the whooshing sound they make as they go by."
        - Douglas Adams
Nick Tarleton - [EMAIL PROTECTED] - PGP key available

_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to