On Sat, Mar 01, 2003 at 12:22:23PM -0800, Ian Clarke wrote:
> > I have some questions about the cryptography used. First, which
> > specific algorithms are used?
> 
> We use SHA1, AES, and Twofish in various different ways, take a look at 
> the papers section of our website for some descriptions of how these are 
> used within the architecture.

Also, DHAES (google for it), which is based on ElGamal. Also google for 
the "Station to Station" protocol. 

> 
> > Second, would someone care to give me
> > links to resources or explanations for the non mathematically advanced
> > of us?
> 
> Get a book called "Applied Cryptography", believe it or not it makes 
> quite good reading.
> 

        Scott

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20030301/2ee74c29/attachment.pgp>

Reply via email to