Changes To Algorithm and Implementation
Not logged in

Changes to "Algorithm and Implementation" between 2017-03-14 06:33:21 and 2017-03-14 06:57:50

    32     32   <h3>Optional Silktorrent Packet Header Fields</h3>
    33     33   
    34     34   <p>All of the files in the "header" folder are part of the tar-file and
    35     35   influence the secure hash of the tar-file. Secure hash algorithms do have
    36     36   collisions, but within the limits of those collisions the headers are
    37     37   inseparable from the Silktorrent packet. Silktorrent packet creation software
    38     38   is allowed to add additional, implementation specific, files to a folder called
    39         -"custom_headers" and the "custom_headers" must be a direct child folder of the
    40         -"header" folder. &nbsp;</p>
           39  +"custom_headers" and the folder "custom_headers" must be a direct child folder
           40  +of the "header" folder. &nbsp;</p>
    41     41   
    42     42   <p><br>
    43     43   </p>
    44     44   
    45     45   <p><br>
    46     46   </p>
    47     47   
................................................................................
    53     53   memory card attached to its leg, a drone with an USB-stick, ordinary HTTP,
    54     54   BitTorrent, Tor network, <a href="https://freenetproject.org/">Freenet</a>,
    55     55   etc. The details are at a separate document.</p>
    56     56   
    57     57   <p><a href="http://longterm.softf1.com/specifications/experimental/silktorrent_v_1_0/">Specification_v_1_0</a><br>
    58     58   </p>
    59     59   
           60  +<p><br>
           61  +</p>
           62  +
           63  +<p><br>
           64  +</p>
           65  +
           66  +<h2>Messaging Related Aspects</h2>
           67  +
           68  +<p>Due to the fact that encryption function is a reverse function of decryption
           69  +function, deriving the decryption function from a public encryption key and a
           70  +publicly known encryption algorithm is only a matter of mathematical ingenuity.
           71  +Therefore <b>only symmetric encryption algorithms can be sufficiently strong.</b>
           72  +Silktorrent packets that are used for delivering messages/letters, should be
           73  +kept free of all cleartext metadata. The ID of the encryption/decryption key is
           74  +part of cleartext metadata. The solution might be to use only one-time keys or
           75  +a huge set of keys or use a solution, where a single key has thousands of
           76  +different ID-s, which are loaded into a relational database to create a
           77  +2-column table with the relations: key_ID -&gt; key_file_path.&nbsp;</p>
           78  +
           79  +<p>&nbsp;</p>
           80  +
    60     81   <p><br>
    61     82   </p>
    62     83   
    63     84   <p><br>
    64     85   </p>