-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>
> This will provide both ends with a cipherkey, at which point both can
> transition to secure traffic. I propose that at least initially, we agree
> on a single cipher that *must* be supported by all the servers. In fact,
> I propose XOR. (hold your lynching for a moment)
I want to retract the XOR idea, I'm a little worried that discovering part
of the key bits from dh negotiation makes searching the discrete logarithm
field for the remaining bits easier. What we really need is an initial
cipher that has a small key setup time (blowfish is bad for this, twofish
in one of its zero or small key schedules would be okay).
Scott
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5CdtCpXyM95IyRhURAh1NAKCo0Fp9kihyIXFKNGyaasemqHPo8gCgx1xM
s/uZ+oC3/pIMMDD8daIMaT8=
=/bFI
-----END PGP SIGNATURE-----
_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev