DistOS 2014W Lecture 15: Difference between revisions

From Soma-notes
Nelaturuk (talk | contribs)
Designing Exercise
Cdelahou (talk | contribs)
Added big takeaway
Line 15: Line 15:


Integrity: hashing, but we assume hashes can be forged. If we want to know that we got the same file, then simply send each other the file and compare.
Integrity: hashing, but we assume hashes can be forged. If we want to know that we got the same file, then simply send each other the file and compare.
'''Big Takeaway'''
Everything you do with crypto is a refinement of what you can already do in
weaker forms with weaker assumptions.


'''Note on Project Proposal'''  
'''Note on Project Proposal'''  
* Date has been extended until next week. As Prof said some of the proposals are not completely up to mark.
* Date has been extended until next week. As Prof said some of the proposals are not completely up to mark.

Revision as of 20:16, 18 April 2014

Designing Exercise

Can we do any kind of distributed system without crypto? We can't trust crypto...

What are the main features we need to consider for such a system ?

  • Limited Sharing
  • Integrity
  • Availability

Perhaps probabilistically...

Want to be able to put data in, have it distributed, and be able to get it out on some other machine. This kind of sharing would need identification or authentication process.

Availability: "distribute the crap out of it", doesn't need crypto. No corruption of data.

Integrity: hashing, but we assume hashes can be forged. If we want to know that we got the same file, then simply send each other the file and compare.

Big Takeaway Everything you do with crypto is a refinement of what you can already do in weaker forms with weaker assumptions.


Note on Project Proposal

  • Date has been extended until next week. As Prof said some of the proposals are not completely up to mark.