On Sat, 2003-03-01 at 14:22, Ian Clarke wrote:
> > I have some questions about the cryptography used. First, which
> > specific algorithms are used?
> 
> We use SHA1, AES, and Twofish in various different ways, take a look at 
> the papers section of our website for some descriptions of how these are 
> used within the architecture.
> 
> > Second, would someone care to give me
> > links to resources or explanations for the non mathematically advanced
> > of us?
> 
> Get a book called "Applied Cryptography", believe it or not it makes 
> quite good reading.

Just remember that "The Handbook of Applied Cryptography" is an entirely
different book.  "Applied Crypto" doesn't have any true math in it (in
the sense of doing proofs)--it's meant for software developers who want
to create cryptographic software.  "Handbook" is a much more in-depth
book that will make the mathmatically-challenged a bit of head-spinning.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 240 bytes
Desc: This is a digitally signed message part
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20030301/cc118f84/attachment.pgp>

Reply via email to