Da PGP a Zfone

Ovvero il VoIP P2P sicuro secondo Philip Zimmermann — basato sul protocollo ZRTP.

ZRTP protocol uses a public key algorithm [but] does not rely on a public key infrastructure (PKI). In fact, it does not use persistant public keys at all. It uses ephemeral Diffie-Hellman with hash commitment, and allows the detection of man-in-the-middle (MiTM) attacks…

approfondimenti: Introduzione alla crittografia, ZRTP Internet Draft

articoli su ZRTP: Wired news, Associated Press, eWeek, TechWorld, CNET News

This entry was posted in Null. Bookmark the permalink.

Leave a Reply