Michael Amling wrote:The great thing about attackers is that there are so many to choose from!
> the OP's threat model included a malicious peer
You should be using
* a small non-cryptographic error-correcting code between the peers
* a strong cryptographic authenticator as the most efficient way to
* a signature from the original source of the data as the only way to
I was commenting solely on the balance between the first two stages; I
---D. J. Bernstein, Associate Professor, Department of Mathematics,
You must Sign in before you can post messages.
To post a message you must first join this group.
Please update your nickname on the subscription settings page before posting.
You do not have the permission required to post.