On Sat, Mar 01, 2003 at 12:22:23PM -0800, Ian Clarke wrote: > > I have some questions about the cryptography used. First, which > > specific algorithms are used? > > We use SHA1, AES, and Twofish in various different ways, take a look at > the papers section of our website for some descriptions of how these are > used within the architecture.
Also, DHAES (google for it), which is based on ElGamal. Also google for
the "Station to Station" protocol.
>
> > Second, would someone care to give me
> > links to resources or explanations for the non mathematically advanced
> > of us?
>
> Get a book called "Applied Cryptography", believe it or not it makes
> quite good reading.
>
Scott
pgp00000.pgp
Description: PGP signature
