On Sat, 2003-03-01 at 14:22, Ian Clarke wrote: > > I have some questions about the cryptography used. First, which > > specific algorithms are used? > > We use SHA1, AES, and Twofish in various different ways, take a look at > the papers section of our website for some descriptions of how these are > used within the architecture. > > > Second, would someone care to give me > > links to resources or explanations for the non mathematically advanced > > of us? > > Get a book called "Applied Cryptography", believe it or not it makes > quite good reading.
Just remember that "The Handbook of Applied Cryptography" is an entirely different book. "Applied Crypto" doesn't have any true math in it (in the sense of doing proofs)--it's meant for software developers who want to create cryptographic software. "Handbook" is a much more in-depth book that will make the mathmatically-challenged a bit of head-spinning. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 240 bytes Desc: This is a digitally signed message part URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20030301/cc118f84/attachment.pgp>
