Privacy

From Organic Design wiki
Revision as of 02:45, 9 August 2006 by Nad (talk | contribs) (add some post heated-privacy-conversation notes)

Why do we need security?

Having good security is an important aspect of the network architechtrue because it is designed to handle financial accounting and budgetting of its member organisations. Also, the users of the network need to be confident that private information such as passwords or personal details really are private.

Real security a myth?

There isn't much confidence in real privacy these days with all the rumors and/or facts of "back doors" and quantum computers which can achieve seemingly miraculous computational power. But before getting sucked in to all the hype, bare this simple foundation in mind - if two people share a private random block of information which is the same size as a message and used only once it is impossible to break by any mathematical means including any quantum algorithm (it exhibits information theoretic security). Its only organisation which makes this method impractical - in practice this would usually be combined with traditional methods.

Method

The privacy concept uses a portion of its global bandwidth resource to distribute private keys over all available data streams. This resource comes from the support that the privacy concept gains from usage.

This privacy is handled with any of the standard algorithms such as DES or AES, but using the inherent organisational methods to generate and maintain a diverse population of private keys so that any context of information can be made arbitrarily secure dynamically and independently. A small portion of bandwidth is dedicated to random connectivity for creating keys with more diverse properties, and for finding new efficient routes.

When a context requires its connected streams to be authenticated, it generates random content along with a randomly selected key it shares in common with the peer. The context expects a hash of the random content and private value associated with the key. This can happen any number of times and can also occur independently of the context directly between peers.

Organisational aspects requiring privacy

  • Logins and passwords need to be securely routed amongst peers
  • Financial transactions and account balances must be trusted
  • Users personal information must be kept private

Available key properties/constraints

  • Media its resided on (RAM, HDD, Removable etc)
  • Peers its resided on
  • Protocols its travelled through