gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] [gnunet] 38/41: +


From: gnunet
Subject: [GNUnet-SVN] [gnunet] 38/41: +
Date: Tue, 28 Nov 2017 21:03:44 +0100

This is an automated email from the git hooks/post-receive script.

ng0 pushed a commit to branch master
in repository gnunet.

commit 9812ab6abacc1e86a92dd8d110ada991ff85dab7
Author: ng0 <address@hidden>
AuthorDate: Mon Nov 20 17:26:07 2017 +0000

    +
---
 doc/documentation/chapters/philosophy.texi | 31 ++++++++++++++++++++++++------
 1 file changed, 25 insertions(+), 6 deletions(-)

diff --git a/doc/documentation/chapters/philosophy.texi 
b/doc/documentation/chapters/philosophy.texi
index f6fe8df7b..af273fec6 100644
--- a/doc/documentation/chapters/philosophy.texi
+++ b/doc/documentation/chapters/philosophy.texi
@@ -2,6 +2,9 @@
 @node Philosophy
 @chapter Philosophy
 
address@hidden NOTE: We should probably re-use some of the images lynX created
address@hidden for secushare, showing some of the relations and functionalities
address@hidden of GNUnet.
 The foremost goal of the GNUnet project is to become a widely used,
 reliable, open, non-discriminating, egalitarian, unfettered and
 censorship-resistant system of free information exchange.
@@ -32,7 +35,12 @@ decentralized Internet protocols.
 These are the core GNUnet design goals, in order of relative importance:
 
 @itemize
address@hidden GNUnet must be implemented as free software.
address@hidden GNUnet must be implemented as
address@hidden://www.gnu.org/philosophy/free-sw.html, Free Software}
address@hidden To footnote or not to footnote, that's the question.
address@hidden means that you you have the four essential freedoms: to run
+the program, to study and change the program in source code form,
+to redistribute exact copies, and to distribute modified versions.}
 @item GNUnet must only disclose the minimal amount of information
 necessary.
 @item GNUnet must be decentralised and survive Byzantine failures in any
@@ -124,6 +132,8 @@ with the goals of the group is always preferable.
 @section Key Concepts
 
 In this section, the fundamental concepts of GNUnet are explained.
address@hidden FIXME: Use @uref{https://docs.gnunet.org/whatever/, research 
papers}
address@hidden once we have the new bibliography + subdomain setup.
 Most of them are also described in our research papers.
 First, some of the concepts used in the GNUnet framework are detailed.
 The second part describes concepts specific to anonymous file-sharing.
@@ -146,15 +156,24 @@ The second part describes concepts specific to anonymous 
file-sharing.
 Almost all peer-to-peer communications in GNUnet are between mutually
 authenticated peers.  The authentication works by using ECDHE, that is a
 DH key exchange using ephemeral eliptic curve cryptography.  The ephemeral
-ECC keys are signed using ECDSA.  The shared secret from ECDHE is used to
-create a pair of session keys (using HKDF) which are then used to encrypt
-the communication between the two peers using both 256-bit AES and 256-bit
-Twofish (with independently derived secret keys).  As only the two
-participating hosts know the shared secret, this authenticates each packet
+ECC (Eliptic Curve Cryptography) keys are signed using ECDSA.
address@hidden FIXME: Long word for ECDSA
+The shared secret from ECDHE is used to create a pair of session keys
address@hidden FIXME: LOng word for HKDF
+(using HKDF) which are then used to encrypt the communication between the
address@hidden FIXME: AES
+two peers using both 256-bit AES
address@hidden FIXME: Twofish
+and 256-bit Twofish (with independently derived secret keys).
+As only the two participating hosts know the shared secret, this
+authenticates each packet
address@hidden FIXME SHA.
 without requiring signatures each time.  GNUnet uses SHA-512 hash codes to
 verify the integrity of messages.
 
 In GNUnet, the identity of a host is its public key.  For that reason,
address@hidden FIXME: is it clear to the average reader what a man-in-the-middle
address@hidden attack is?
 man-in-the-middle attacks will not break the authentication or accounting
 goals.  Essentially, for GNUnet, the IP of the host has nothing to do with
 the identity of the host.  As the public key is the only thing that truly

-- 
To stop receiving notification emails like this one, please contact
address@hidden



reply via email to

[Prev in Thread] Current Thread [Next in Thread]