
Más información sobre el libro
This book, along with the essay “Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption,” introduces the Echo Protocol, highlighting its characteristics in Graph-Theory, Routing-Theory, Networking, and Encryption. Unlike the TCP protocol, Echo operates without routing information, utilizing a multi- and hybrid-encryption approach. Network nodes send packets to all connections, forming a flooding network, which is particularly relevant for anonymizing mix networks like Tor and I2P. The Echo Protocol features various modes of operation, including Full, Half, and Adaptive Echo, as well as sub-protocols like POPTASTIC (encrypted chat over email servers) and SECRED (cryptographic discovery akin to DHT). The book discusses innovative encryption methods such as Secret Streams, Pass-Through PatchPoints, and Instant Perfect Forward Secrecy via IPFS, utilizing both symmetric and asymmetric keys. Echo Clients like Spot-On and GoldBug Crypto Chat have already adopted these innovations, ushering in an Era of Exponential Encryption characterized by novel multi-encryption strategies. The authors envision a future where encryption and decryption evolve towards exponential multiplication, affecting keys, routes, and message handling. They analyze this landscape, identifying four dimensions of the Era of Exponential Encryption and offering recommendations across social, economic, political, legal, and educational s
Compra de libros
Beyond cryptographic routing, Mele Gasakis
- Idioma
- Publicado en
- 2018
- product-detail.submit-box.info.binding
- (Tapa dura)
Métodos de pago
Nadie lo ha calificado todavía.