----- Original Message ----- From: "Ivan "cool" Tewell" <[email protected]>
> Isn't it true, however, that, given any key of <i>any</i> keytype, one > could successfully tamper, becase, by their very nature, Freenet keys > must (a) give the user the knowledge to find the freenet search entry > (what's stored on your local node), and (b) allow the user to decrypt > that data? No. SVKs (of which KSKs and SSKs are both a part of) are based on public key cryptography. You use the public key to find it but need to use the private key to insert it. The reason that KSKs are inheriently insecure is becuase the private key is, iirc, just a SHA1 hash of the rememberable part. SVKs and SSKs don't have this problem becuase they aren't in a public (meaning: known public key) keyspace. CHKs use something called progressive hashes. Lets pretend that the data is sent to the nodes and client in 4k chunks. All of the 4k except for the last 20 bytes is data. The last 20 bytes is the hash for the next 4k chunk. The key that you use to search for the CHK is the hash of the first chunk. Now, on top of this, there is encryption of the file (before it's broken into these chunks). This keeps you data secure. > Ivan. -Mathew _______________________________________________ Devl mailing list Devl at freenetproject.org http://lists.freenetproject.org/mailman/listinfo/devl
