On Sat, Mar 01, 2003 at 12:22:23PM -0800, Ian Clarke wrote:
> > I have some questions about the cryptography used. First, which
> > specific algorithms are used?
>
> We use SHA1, AES, and Twofish in various different ways, take a look at
> the papers section of our website for some descriptions of how these are
> used within the architecture.
Also, DHAES (google for it), which is based on ElGamal. Also google for
the "Station to Station" protocol.
>
> > Second, would someone care to give me
> > links to resources or explanations for the non mathematically advanced
> > of us?
>
> Get a book called "Applied Cryptography", believe it or not it makes
> quite good reading.
>
Scott
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL:
<https://emu.freenetproject.org/pipermail/devl/attachments/20030301/2ee74c29/attachment.pgp>