Evan Daniel wrote:

> On Sat, Feb 6, 2010 at 12:57 PM, Michael Rogers
> <m.rogers at cs.ucl.ac.uk> wrote:
>> Evan Daniel wrote:
>>>> They only request the successful one, so the squatted ones fall out of
>>>> the network.
>>>
>>> In which case, the KSK isn't actually the SHA of the final data...
>>
>> Right - it's the SHA1 of the data stored under the KSK. The data stored
>> under the KSK is the key of a redirect to the final data. The inserter
>> can make any number of redirects to the same data, and therefore any
>> number of distict KSKs, until one of them inserts without a collision,
>> at which point the inserter has a KSK to give to the requester.
> 
> Then what's the benefit over using a short KSK, as I was suggesting?

It all boils down to that the receiver can verify he's not being redirected 
to a bogus site.

I was hoping for a short and secure hash, but alas the short part is not 
that short anymore.


Reply via email to