Gratis Versand in ganz Österreich
Bookbot

Beyond cryptographic routing

Autor*innen

Parameter

  • 228 Seiten
  • 8 Lesestunden

Mehr zum Buch

This book, along with the essay “Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption,” introduces the Echo Protocol, highlighting its characteristics in Graph-Theory, Routing-Theory, Networking, and Encryption. Unlike the TCP protocol, Echo operates without routing information, utilizing a multi- and hybrid-encryption approach. Network nodes send packets to all connections, forming a flooding network, which is particularly relevant for anonymizing mix networks like Tor and I2P. The Echo Protocol features various modes of operation, including Full, Half, and Adaptive Echo, as well as sub-protocols like POPTASTIC (encrypted chat over email servers) and SECRED (cryptographic discovery akin to DHT). The book discusses innovative encryption methods such as Secret Streams, Pass-Through PatchPoints, and Instant Perfect Forward Secrecy via IPFS, utilizing both symmetric and asymmetric keys. Echo Clients like Spot-On and GoldBug Crypto Chat have already adopted these innovations, ushering in an Era of Exponential Encryption characterized by novel multi-encryption strategies. The authors envision a future where encryption and decryption evolve towards exponential multiplication, affecting keys, routes, and message handling. They analyze this landscape, identifying four dimensions of the Era of Exponential Encryption and offering recommendations across social, economic, political, legal, and educational s

Buchkauf

Beyond cryptographic routing, Mele Gasakis

Sprache
Erscheinungsdatum
2018
product-detail.submit-box.info.binding
(Hardcover)
Wir benachrichtigen dich per E-Mail.

Lieferung

  • Gratis Versand in ganz Österreich

Zahlungsmethoden

Keiner hat bisher bewertet.Abgeben