On Wednesday 03 February 2010 16:44:35 Michael Rogers wrote:
> Not quite, because a CHK would also include a decryption key, which you
> don't need in this case.
> 
> Your suggestion seems like a great idea to me, but how about this
> modification: instead of HSH at sha1/blahblah, just use KSK at sha1/blahblah.
> That way no modifications to the node are necessary - apps can start
> using your scheme immediately, with the app being responsible for
> checking that the received content hashes to the expected value, then
> resubmitting it to the node as a key.

IMHO that would be messy and dangerous, what happens when they insert the wrong 
content?

A CHK without a decryption key is possible, but imho not a good idea. And it's 
not *usably* short - what is the benefit?

The usual proposal is to have a per-node configured lookup table e.g. 
tufi/toad...
> 
> Cheers,
> Michael
> 
> alex wrote:
> > Call me stoopid but I have just described a CHK, right?
> > 
> > alex wrote:
> > 
> >> I was pondering the hideous length of freenet keys. I know they have to be
> >> like that since they're the necessary crypto to decrypt the contents.
> >> However, I got this idea for shorter alternate keys. It's maybe not
> >> readily practical but perhaps you think of something better derived from
> >> this.
> >>
> >> Let's say we have a new key type (HSH from hash). This key is just a
> >> renamed KSK. However, the gist is that the content hash must match the key
> >> itself. The content, in turn, is a proper key to redirect to.
> >>
> >> These keys are as long as the hash used (e.g. for sha1 they would be 28
> >> chars, pity it's broken) and the content is sane, as long as collisions
> >> aren't practical to generate. And now you can paste keys that don't wrap
> >> at 80 chars, for example.
> >>
> >> Certainly, being KSKs, they can be spammed, but they're a convenience, and
> >> the node can check that the content is legit and discard it if spoofed.
> >>
> >> Example:
> >>
> >> HSH at 1d229271928d3f9e2bb0375bd6ce5db6c6d348d9
> >>
> >> or may be
> >>
> >> HSH at sha1/1d229271928d3f9e2bb0375bd6ce5db6c6d348d9
> >>
> > HSH at 
> > sha256/66a045b452102c59d840ec097d59d9467e13a3f34f6494e539ffd32c1bb35f18
> >> to make it generic on the hash used.
> >>
> >> Dunno if attacks to short hashes are able to provide colliding content of
> >> the same length as the original. Otherwise, even if flawed, short hashes
> >> could be still usable as long as the expected content has to be a valid
> >> CHK.
> > 
> > 
> > _______________________________________________
> > Tech mailing list
> > Tech at freenetproject.org
> > http://osprey.vm.bytemark.co.uk/cgi-bin/mailman/listinfo/tech
> 
> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> http://osprey.vm.bytemark.co.uk/cgi-bin/mailman/listinfo/tech
> 
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 835 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20100204/09364932/attachment.pgp>

Reply via email to