PeerFrogs

See also: Security | Attack

Home Page: http://peertech.org/peerfrog/

A type of Man-In-The-Middle Attack to harm large decentralized peer networks where traditional PKI and webs of trust are hard to apply to the transient communication between large numbers of unknown peers.

The process works in two steps. The first is a period of key seeding to a large number of peers. public keys of suitable length are stored at these remote peers for use later, while the private key is maintained locally. A protocol is defined to ensure that the state of remote keys held by a peer is verbatim before they are used.

Once keys have been seeded channel setup can begin to exchange the secret. Connection setup consists of multiple wide mouth frog cryptographic handshakes between peers. Implementing a Man-In-The-Middle Attack thus requires that the attacker be able to intercept not only the target’s network traffic, but also all peers used in the channel setup. In addition to this, the attacker would have to intercept traffic to all peers for the duration of the key seeding process.

TakeDown.NET -> “PeerFrogs