hi, Since they are using symmetric keys, for a network of 'n' nodes, each node need to know the secret key that they share with the remaining (n-1) nodes.Total number of symmetric keys that need to be distributed is [n*(n-1)]/2. Key management is harder when they network gets larger. Sarath. --- Sunder <sunder@sunder.net> wrote:
http://www.wired.com/news/print/0,1294,64464,00.html Onion Routing Averts Prying Eyes By Ann Harrison
Story location:
http://www.wired.com/news/privacy/0,1848,64464,00.html
02:00 AM Aug. 05, 2004 PT
Computer programmers are modifying a communications system, originally developed by the U.S. Naval Research Lab, to help Internet users surf the Web anonymously and shield their online activities from corporate or government eyes.
<SNIP>
The Navy is financing the development of a second-generation onion-routing system called Tor, which addresses many of the flaws in the original design and makes it easier to use. The Tor client behaves like a SOCKS proxy (a common protocol for developing secure communication services), allowing applications like Mozilla, SSH and FTP clients to talk directly to Tor and route data streams through a network of onion routers, without long delays.
<SNIP>
----------------------Kaos-Keraunos-Kybernetos---------------------------
+ ^ + :"War is Peace /|\ \|/ : Freedom is Slavery /\|/\ <--*-->: Ignorance is Strength \/|\/ /|\ : Bush is President" - Bret Feinblatt \|/ + v + :
-------------------------------------- http://www.sunder.net ------------
_______________________________ Do you Yahoo!? Express yourself with Y! Messenger! Free. Download now. http://messenger.yahoo.com