Plus d’un million de livres, à portée de main !
Bookbot

Beyond cryptographic routing

Paramètres

  • 228pages
  • 8 heures de lecture

En savoir plus sur le livre

This book, along with the essay “Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption,” introduces the Echo Protocol, highlighting its characteristics in Graph-Theory, Routing-Theory, Networking, and Encryption. Unlike the TCP protocol, Echo operates without routing information, utilizing a multi- and hybrid-encryption approach. Network nodes send packets to all connections, forming a flooding network, which is particularly relevant for anonymizing mix networks like Tor and I2P. The Echo Protocol features various modes of operation, including Full, Half, and Adaptive Echo, as well as sub-protocols like POPTASTIC (encrypted chat over email servers) and SECRED (cryptographic discovery akin to DHT). The book discusses innovative encryption methods such as Secret Streams, Pass-Through PatchPoints, and Instant Perfect Forward Secrecy via IPFS, utilizing both symmetric and asymmetric keys. Echo Clients like Spot-On and GoldBug Crypto Chat have already adopted these innovations, ushering in an Era of Exponential Encryption characterized by novel multi-encryption strategies. The authors envision a future where encryption and decryption evolve towards exponential multiplication, affecting keys, routes, and message handling. They analyze this landscape, identifying four dimensions of the Era of Exponential Encryption and offering recommendations across social, economic, political, legal, and educational s

Achat du livre

Beyond cryptographic routing, Mele Gasakis

Langue
Année de publication
2018
product-detail.submit-box.info.binding
(rigide)
Nous vous informerons par e-mail dès que nous l’aurons retrouvé.

Modes de paiement

Personne n'a encore évalué .Évaluer