[Cryptography] Implementations, attacks on DHTs, Mix Nets?

Jonathan Thornburg jthorn at astro.indiana.edu
Tue Aug 27 21:47:04 EDT 2013


On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> Say that you want to distribute a database table consisting of human
> readable IDs, cryptographic keys and network endpoints for some
> reason. Say you want it to scale to hundreds of millions of users.

This sounds remarkably like a description of DNSSEC.

Assuming it were widely deployed, would DNSSEC-for-key-distribution
be a reasonable way to store
  email_address --> public_key  
mappings?

-- 
-- "Jonathan Thornburg <jthorn at astro.indiana.edu>
   Dept of Astronomy & IUCSS, Indiana University, Bloomington, Indiana, USA
   "There was of course no way of knowing whether you were being watched
    at any given moment.  How often, or on what system, the Thought Police
    plugged in on any individual wire was guesswork.  It was even conceivable
    that they watched everybody all the time."  -- George Orwell, "1984"


More information about the cryptography mailing list