On Thu, 27 Apr 2000, Scott G. Miller wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > As I see it, the following are ripe for implementation now and all that > > is needed is for someone to take responsibility for them: > > > > Inter-node encryption > > I can take this one in the manner Oskar suggested. I've already completed > a key exchange and socket crypto layer. Its just a matter of hooking it > up to freenet at the connection layer. What cipher do we want to > use. My vote is for Blowfish or Twofish (probably the former since its > more aged :)
I would vote for Blowfish too. It is not the newest or fastest of the cryptos, but it has been around a while now, and unlike the AES cryptos which scream "government" to me, and the RSADI cryptos which scream coporation, Blowfish has always felt more like the free underdog to me, which fits us (ok, that isn't completely rational, but hey :-) ). > > > Local data encrpytion using the plaintext keys > Ditto. This is a client issue, probably a 20 minute job if we decide on a > cipher. I say fish here also. > > Scott > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.1 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE5CFNCpXyM95IyRhURAtksAKDGEYSktcDNXwPj3cl21DJo48l8mwCfd1J0 > euwwdxnnJRRZEoIhkboHVdc= > =aWVH > -----END PGP SIGNATURE----- > > > _______________________________________________ > Freenet-dev mailing list > Freenet-dev at lists.sourceforge.net > http://lists.sourceforge.net/mailman/listinfo/freenet-dev -- Oskar Sandberg md98-osa at nada.kth.se #!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj $/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/) _______________________________________________ Freenet-dev mailing list Freenet-dev at lists.sourceforge.net http://lists.sourceforge.net/mailman/listinfo/freenet-dev
