[Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Perry E. Metzger
For some research on communications privacy I'm doing at the moment, I'm interested in learning about the state of the art of DHT systems and mix network systems. I'd like to know both which systems are currently considered state of the art and what the state of the art is on attacks against such

[Cryptography] Traffic Analysis (was Re: PRISM PROOF Email)

2013-08-25 Thread Perry E. Metzger
On Fri, 23 Aug 2013 09:38:21 -0700 Carl Ellison c...@acm.org wrote: Meanwhile PRISM was more about metadata than content, right? How are we going to prevent traffic analysis worldwide? The best technology for that is mix networks. At one point, early in the cypherpunks era, mix networks were

[Cryptography] Thoughts about keys

2013-08-25 Thread Perry E. Metzger
[Disclaimer: very little in this seems deeply new, I'm just mixing it up in a slightly different way. The fairly simple idea I'm about to discuss has germs in things like SPKI, Certificate Transparency, the Perspectives project, SSH, and indeed dozens of other things. I think I even suggested a

Re: [Cryptography] PRISM PROOF Email

2013-08-25 Thread Ray Dillinger
On 08/22/2013 02:36 AM, Phillip Hallam-Baker wrote: Thanks to Snowden we now have a new term of art 'Prism-Proof', i.e. a security scheme that is proof against state interception. Having had an attack by the Iranians, I am not just worried about US interception. Chinese and Russian intercepts

[Cryptography] Hey! You! Get off of the cloud!

2013-08-25 Thread Perry E. Metzger
[Second in a series of several posts about what is needed to make all Internet messaging go encrypted. Again, if the contents of this post sound unoriginal, that's because it isn't original thinking. It does strike me as part of a larger puzzle, however, and some people may not be familiar with

Re: [Cryptography] PRISM PROOF Email

2013-08-25 Thread Perry E. Metzger
On Sun, 25 Aug 2013 10:37:52 -0700 Ray Dillinger b...@sonic.net wrote: Therefore, IMO, any possible solution to email privacy, if it is to be trusted at all, must be pure P2P with no centralized points of failure/control and no specialized routers etc. Quite agreed. I have a long message in

[Cryptography] Email and IM are ideal candidates for mix networks

2013-08-25 Thread Perry E. Metzger
[Third in an ongoing series. Disclaimer yet again: I make few claims of the contents here being specifically original to me. Mix networks and the like have been discussed forever, and I'm sure others have been having similar thoughts to this of late.] The aim of the Tor network (which, it should

Re: [Cryptography] Email and IM are ideal candidates for mix networks

2013-08-25 Thread Christian Huitema
I think we can agree that the first step is to deploy home servers, and that the first application there would to host communication applications. Just doing that without much other change would already provide protection against the silent spying that goes on in big cloud servers. Initial

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Ralph Holz
On 08/25/2013 09:12 PM, Perry E. Metzger wrote: For some research on communications privacy I'm doing at the moment, I'm interested in learning about the state of the art of DHT systems and mix network systems. I'd like to know both which systems are Can you rephrase whether you want info

Re: [Cryptography] Email and IM are ideal candidates for mix networks

2013-08-25 Thread Perry E. Metzger
On Sun, 25 Aug 2013 16:04:59 -0700 Christian Huitema huit...@huitema.net wrote: I think we can agree that the first step is to deploy home servers, and that the first application there would to host communication applications. Just doing that without much other change would already provide

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Perry E. Metzger
On Sun, 25 Aug 2013 21:33:42 +0200 Ralph Holz ralph-cryptometz...@ralphholz.de wrote: On 08/25/2013 09:12 PM, Perry E. Metzger wrote: For some research on communications privacy I'm doing at the moment, I'm interested in learning about the state of the art of DHT systems and mix network

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Christian Huitema
My knowledge of the field is pretty spotty in general as I've never paid much attention up until now -- mostly I know about how people have built DHTs in non-hostile environments. I'm close enough to starting from scratch that I don't know yet what I don't know. I studied such systems

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Perry E. Metzger
On Sun, 25 Aug 2013 16:42:57 -0700 Christian Huitema huit...@huitema.net wrote: I studied such systems intensely, and designed some (http://en.wikipedia.org/wiki/Peer_Name_Resolution_Protocol). Using a distributed hash table securely is really hard. The basic idea of DHT is that information is

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread Christian Huitema
That is not my worry. Signing the data posted to the DHT can prevent spoofing, querying it over a mix network or using a PIR protocol can prevent eavesdropping. I'm more worried about various sorts of denial of service attacks, or service being shut down by inadvertent behavior. Of course the

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

2013-08-25 Thread James A. Donald
On 2013-08-26 11:04 AM, Christian Huitema wrote: Of course the data can be signed, encrypted, etc. But the rule of the game is that the adversary can manufacture as many peers as they want -- something known as the Sybil attack. They can then perform various forms of denial. We need, and have

Re: [Cryptography] Email and IM are ideal candidates for mix networks

2013-08-25 Thread Jerry Leichter
On Aug 25, 2013, at 6:28 PM, Perry E. Metzger wrote: [Commenting on just one minor piece] ...Similar techniques may be useful for voice traffic, but that has interesting latency requirements, and they're hard to fulfill with a mix network that might take arbitrary time. There's been some

Re: [Cryptography] Email and IM are ideal candidates for mix networks

2013-08-25 Thread Jerry Leichter
On Aug 25, 2013, at 7:04 PM, Christian Huitema wrote: I think we can agree that the first step is to deploy home servers, and that the first application there would to host communication applications. Just doing that without much other change would already provide protection against the

Re: [Cryptography] Traffic Analysis (was Re: PRISM PROOF Email)

2013-08-25 Thread Phillip Hallam-Baker
There has to be a layered approach. Traffic analysis is probably going to demand steganography and that is almost by definition outside standards work. The part of Prism that I consider to be blatantly unconstitutional is that they keep all the emails so that they can search them years later