Plus d’un million de livres, à portée de main !
Bookbot

Mele Gasakis

    Beyond cryptographic routing
    The New Era Of Exponential Encryption
    • 2019

      The New Era Of Exponential Encryption

      - Beyond Cryptographic Routing with the Echo Protocol [Paperback]

      The authors present a vision of exponential growth in encryption and decryption processes, akin to a grain of rice doubling on a chessboard. This growth introduces a multitude of encryption options, necessitating more session-related keys for configuring hybrid encryption. Various methods, including symmetric, asymmetrical, and modern multiple encryption, are explored. The book analyzes applications like Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger, showcasing how they implement these advanced encryption mechanisms. The concept of "perfect forward secrecy" evolves into "instant perfect forward secrecy" (IPFS), allowing for multiple keys to be sent before a message arrives, enhancing security. This leads to the introduction of Fiasco Keys, which provide numerous ephemeral keys within a single session, further developing the idea of Fiasco Forwarding that complements IPFS. By integrating routing and graph theory into encryption, as seen in the Echo Protocol, encrypted packets can traverse various routes in the network. This marks a shift into a new era, termed the Era of Exponential Encryption. The authors propose that if routing relies on cryptographic insights rather than destination information, it transcends traditional cryptographic routing. They also outline four key areas within this era, offering social, legal, political, and economic recommendations based on these advancements.

      The New Era Of Exponential Encryption
    • 2018

      Beyond cryptographic routing

      • 228pages
      • 8 heures de lecture

      This book, along with the essay “Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption,” introduces the Echo Protocol, highlighting its characteristics in Graph-Theory, Routing-Theory, Networking, and Encryption. Unlike the TCP protocol, Echo operates without routing information, utilizing a multi- and hybrid-encryption approach. Network nodes send packets to all connections, forming a flooding network, which is particularly relevant for anonymizing mix networks like Tor and I2P. The Echo Protocol features various modes of operation, including Full, Half, and Adaptive Echo, as well as sub-protocols like POPTASTIC (encrypted chat over email servers) and SECRED (cryptographic discovery akin to DHT). The book discusses innovative encryption methods such as Secret Streams, Pass-Through PatchPoints, and Instant Perfect Forward Secrecy via IPFS, utilizing both symmetric and asymmetric keys. Echo Clients like Spot-On and GoldBug Crypto Chat have already adopted these innovations, ushering in an Era of Exponential Encryption characterized by novel multi-encryption strategies. The authors envision a future where encryption and decryption evolve towards exponential multiplication, affecting keys, routes, and message handling. They analyze this landscape, identifying four dimensions of the Era of Exponential Encryption and offering recommendations across social, economic, political, legal, and educational s

      Beyond cryptographic routing