Suggested reading before reading the infoAnarchy article Why Freenet is Complicated (or not) by scgmille

It certainly appears complicated to me! That's why I prepared this glossary!

AESAdvanced Encryption Standard
Base64An ASP server side object
block-cipherA self-study course in block-cipher cryptanalysis
CodeCon 2002
The premier event in 2002 for the P2P, cypherpunk, and network/security application developer community. It is a workshop for developers of real-world applications that support individual liberties. All presentations were given by one of the active developers, and accompanied by a functional demo.
connection agnosticity?
cryptographic primitives Symmetric, asymmetric and hybrid ciphers, authentication primitives and random number generators
FCPFibre Channel Protocol(?)
freenetMore on Freenet
Freenet Client Protocol Apparently something that hex-encodes numbers, allows one transaction per connection and square-brackets optional fields.
Java SDK 1.3?
JMS? class provides a crytpographically strong pseudo-random number generator based on the SHA-1 hash algorithm.
JUnit framework?


According to Georg Thurner, a keyspace can be visualized by visualizing first the following:

A simple rectangle with different colored dots representing:

  • Blocks issued for the first time (with no result received sofar)
  • Blocks issued with a result returned
  • Blocks re-issued

  • keyspace discovery protocol?
    libfreenetA Freenet library written in C. It provides client functionality, as well as a lower-level API for sending and receiving messages over a Freenet connection, and for reading and writing raw data streams.
    Man in the Middle attackApparently the man in the middle has two faces, one of whom looks like you and one of whom looks like someone else. Guess which side faces you...
    NISTNational Institute of Standards and Technology
    OpenSSLA collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.
    PKIWorldCom's corporate Public Key Infrastructure (PKI) Encryption Certificate Policies
    PRNGSoftware is intended only for use on Unix platforms such as Solaris, SCO, or HP/UX that do not have a cryptographically strong PRNG available
    security.TimerJitterEntropy.javatakes about 20 seconds to seed the generator with 160 bits on an IBM PC.
    Silent BobYour easy-to-use sound recording application !
    Station-to-Station protocol(STS)The three-pass variation of the basic Diffie-Hellman protocol. It allows the establishment of a shared secret key between two parties with mutual entitiy authentication and umutal explicit key authentication. The protocol also facilitates anonymity- the identities of A and B may be protected from eavesdroppers. The method employs digital signatures.
    twofisha new block cipher to succeed the aging AES?
    unique-idExamples include
    The Open Source Foundation's Universal Unique IDentifiers (UUIDs), Microsoft's Globally Unique IDentifiers (GUIDs) and the other Unique ID generator (such as the RMI based UID generator)
    YarrowA secure pseudorandom number generator
    Hosted by