Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Dining Cryptographers, The Protocol

URL
http://dewy.fem.tu-ilmenau.de/CCC/24C3/mp3/24c3-2253-en-dining_cryptographers.mp3
File name
24c3-2253-en-dining_cryptographers.mp3
File size
24.2 MB
MD5
260a59014552d4b31b8f64f7be592fa4
SHA1
e7db8711b6249ee3e1371777f6e2e925717c56fe

Imi gives an introduction into the idea behind DC networks, how and why they work. With demonstration! Back in 1988, David Chaum proposed a protocol for perfect untracable communication. And it was completly different to the (former invented) Mix Cascades. While the Mixes got all the press (heard of "Tor" and "JAP"? Told you!), the idea of DC networks were silently ignored by the majority of the community. This talk is to show how DC networks work, why they are secure and presents an implementation.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !