[Cryptography] Implementations, attacks on DHTs, Mix Nets?

Perry E. Metzger perry at piermont.com
Mon Aug 26 12:09:55 EDT 2013


On Sun, 25 Aug 2013 18:04:13 -0700 "Christian Huitema"
<huitema at huitema.net> wrote:
> Bottom line, anonymous DHT are fragile.

Though it appears that Tor uses them for its hidden service
directory. How does it do that robustly (or does it do it robustly)?
How do other users of DHTs handle attacks in practice (or is it just
that no one has tried attacking them enough?)

My back of the envelope says that there's little enough data needed
in the distributed data store I want that 1000x replication would not
be a serious problem. I presume that is not sufficient to make Sybil
attacks moot, given the size of modern botnets?

Perry
-- 
Perry E. Metzger		perry at piermont.com


More information about the cryptography mailing list