[Cryptography] Implementations, attacks on DHTs, Mix Nets?

Rich Jones rich at openwatch.net
Tue Aug 27 09:32:34 PDT 2013


As always, I'd recommend this fellow check out Anonbib -
http://freehaven.net/anonbib/


On Tue, Aug 27, 2013 at 2:23 AM, Eugen Leitl <eugen at leitl.org> wrote:

> ----- Forwarded message from Peter Gutmann <pgut001 at cs.auckland.ac.nz>
> -----
>
> Date: Tue, 27 Aug 2013 00:28:54 +0000
> From: Peter Gutmann <pgut001 at cs.auckland.ac.nz>
> To: "cryptography at metzdowd.com" <cryptography at metzdowd.com>
> Subject: Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?
>
> Ralph Holz <ralph-cryptometzger at ralphholz.de> writes:
>
> >There is a host of older literature, too - P2P research, however, has
> become
> >a cold topic. Although I expect that it will see a revival in the face of
> >surveillance.
>
> For people who are interested, the list I have (for a year or two back) is:
>
> "Security Considerations for Peer-to-Peer Distributed Hash Tables", Emil
> Sit
> and Robert Morris, Proceedings of the 1st International Workshop on
> Peer-to-
> Peer Systems (IPTPS'01), Springer-Verlag LNCS No.2429, March 2002, p.261.
>
> "A Survey of Peer-to-Peer Security Issues", Dan Wallach, Proceedings of the
> 2002 International Symposium on Software Security (ISSS'02),
> Springer-Verlag
> LNCS No.2609, November 2002, p.42.
>
> "Eclipse Attacks on Overlay Networks: Threats and Defenses", Atul Singh,
> Tsuen-Wan Ngan, Peter Druschel and Dan Wallach, Proceedings of the 25th
> International Conference on Computer Communications (INFOCOM'06), April
> 2006,
>
> "The Index Poisoning Attack in P2P File Sharing Systems", Jian Liang, Naoum
> Naoumov and Keith Ross, Proceedings of the 25th Conference on Computer
> Communications (INFOCOM'06), April 2006,
>
> "Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer
> Network",
> Michael Kohnen, Mike Leske and Erwin Rathgeb, Proceedings of the 8th
> IFIP-TC 6
> Networking Conference (Networking'09), Springer-Verlag LNCS No.5550, May
> 2009,
> p.104.
>
> "Combating Index Poisoning in P2P File Sharing", Lingli Deng, Yeping He and
> Ziyao Xu, Proceedings of the 3rd Conference and Workshops on Advances in
> Information Security and Assurance (ISA'09), Springer-Verlag LNCS No.5576,
> June 2009, p.358.
>
> "Hashing it out in public: Common failure modes of DHT-based anonymity
> schemes", Andrew Tran, Nicholas Hopper and Yongdae Kim, Proceedings of the
> 8th
> Workshop on Privacy in the Electronic Society (WPES'09), November 2009,
> p.71.
>
> "Poisoning the Kad Network", Thomas Locher, David Mysicka, Stefan Schmid
> and
> Roger Wattenhofer, Proceedings of the 11th International Conference on
> Distributed Computing and Networking (ICDCN'10), Springer-Verlag LNCS
> No.5935,
> January 2010, p.195.
>
> If there's anything significant I've missed, feel free to fill in the gaps.
>
> Peter.
> _______________________________________________
> The cryptography mailing list
> cryptography at metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography
>
> ----- End forwarded message -----
> --
> Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
> ______________________________________________________________
> ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
> AC894EC5: 38A5 5F46 A4FF 59B8 336B  47EE F46E 3489 AC89 4EC5
>



-- 
—————————————

Rich Jones
*
OpenWatch* is a global investigative network using mobile technology to
build a more transparent world. Download OpenWatch for
iOS<https://itunes.apple.com/us/app/openwatch-social-muckraking/id642680756?ls=1&mt=8>and
for
Android<https://play.google.com/store/apps/details?id=org.ale.openwatch&hl=en>
!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 5652 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20130827/cc7a7b6e/attachment-0001.txt>


More information about the cypherpunks mailing list