The O'Reilly Peer-to-Peer and Web Services Conference
oreilly.comO'Reilly Network
ConferencesInternationalSafari: Books Online


Arrow Home
Arrow Registration
Arrow Hotel/Travel
Arrow See & Do
Arrow Tutorials
Arrow Keynotes
Arrow Sessions
Arrow BOFs
Arrow Community
Meetings
Arrow Speakers
Arrow Press
Arrow Mail List
Arrow Exhibitors
Arrow Sponsors
Inventing the Post-Web World
The O'Reilly Peer-to-Peer and
Web Services Conference

Washington, D.C. -- November 5-8, 2001
Porpoises

Session

Secure Peer-to-Peer Communication

Jim Lowrey, Cryptography Engineer, Endeavors Technoloy

Track: Security
Date: Wednesday, November 07
Time: 11:15am - 12:00pm
Location: Scott

Do you know who's reading your IM chat today? Crypto engineer Jim Lowrey discusses secure chat, instant messages, file transfers, and e-commerce in light of the Magi peer-to-peer architecture. The talk covers how to make make X509 certificates, key registration and revocation, message integrity, message authentication, symmetric key negotiation, and asynchronous secure communication.

Peer to peer computing faces a bewildering array of security issues not faced by other secure computing paradigms. Asynchronous communication, secure traversal over a variety of protocols, and end user knowledge of security form the basis of issues that are not addressed by accepted security standards such as SSL or PGP.

Chat, instant messages, and file transfers all have different requirements to ensure authentication, integrity, and encryption. Public key infrastructure, protocols, and cryptography form the foundation for these requirements. This talk investigates the overall picture as well specific low level examples.


oreilly.com Home | Conferences Home | P2P & Web Services Home
Registration | Hotels/Travel | Tutorials | Sessions | Speakers
Press | Mail List | Exhibitors | Sponsors


© 2001, O'Reilly Media, Inc.
conftech@oreilly.com