Compra 10 libros por 10 € aquí!
Bookbot

Beyond cryptographic routing

Parámetros

  • 228 páginas
  • 8 horas de lectura

Más información sobre el libro

This book, along with the essay “Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption,” introduces the Echo Protocol, highlighting its characteristics in Graph-Theory, Routing-Theory, Networking, and Encryption. Unlike the TCP protocol, Echo operates without routing information, utilizing a multi- and hybrid-encryption approach. Network nodes send packets to all connections, forming a flooding network, which is particularly relevant for anonymizing mix networks like Tor and I2P. The Echo Protocol features various modes of operation, including Full, Half, and Adaptive Echo, as well as sub-protocols like POPTASTIC (encrypted chat over email servers) and SECRED (cryptographic discovery akin to DHT). The book discusses innovative encryption methods such as Secret Streams, Pass-Through PatchPoints, and Instant Perfect Forward Secrecy via IPFS, utilizing both symmetric and asymmetric keys. Echo Clients like Spot-On and GoldBug Crypto Chat have already adopted these innovations, ushering in an Era of Exponential Encryption characterized by novel multi-encryption strategies. The authors envision a future where encryption and decryption evolve towards exponential multiplication, affecting keys, routes, and message handling. They analyze this landscape, identifying four dimensions of the Era of Exponential Encryption and offering recommendations across social, economic, political, legal, and educational s

Compra de libros

Beyond cryptographic routing, Mele Gasakis

Idioma
Publicado en
2018
product-detail.submit-box.info.binding
(Tapa dura)
Te avisaremos por correo electrónico en cuanto lo localicemos.

Métodos de pago

Nadie lo ha calificado todavía.Añadir reseña