Online demo of Vanish:
http://regina.cs.washington.edu/cgi-bin/vanishservice.py
saqib
http://kawphi.blogspot.com
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
On Jul 21, 2009, at 10:48 PM, Perry E. Metzger wrote:
d...@geer.org writes:
The pieces of the key, small numbers, tend to =93erode=94 over
time as
they gradually fall out of use. To make keys erode, or timeout,
Vanish
takes advantage of the structure of a peer-to-peer file system. Such
d...@geer.org writes:
The pieces of the key, small numbers, tend to =93erode=94 over time as
they gradually fall out of use. To make keys erode, or timeout, Vanish
takes advantage of the structure of a peer-to-peer file system. Such
networks are based on millions of personal computers
The researchers said they had struck upon a unique approach that
relies on “shattering” an encryption key that is held by neither party
in an e-mail exchange but is widely scattered across a peer-to-peer
file sharing system.
The pieces of the key, small numbers, tend to “erode” over time as
they
The pieces of the key, small numbers, tend to =93erode=94 over time as
they gradually fall out of use. To make keys erode, or timeout, Vanish
takes advantage of the structure of a peer-to-peer file system. Such
networks are based on millions of personal computers whose Internet