The Mesh is built on industry standard technologies that include:
- The Mesh protocols are Web services that use JSON encoding and HTTP for transport. Service discovery uses DNS SRV and HTTP Well-Known services.
- The Mesh uses symmetric key cryptography using industry standard algorithms such as AES and SHA-2-512. For public key cryptography, the Mesh prototypes currently use RSA but for production, use of the new elliptic curves x25519 and x448 is planned.
In addition, the Mesh makes use of technologies that offer improvements over the current industry standards:
- JSON-B and JSON-C
- Extensions to the standard JSON encoding that add support for binary data and compressed data
- Proxy Re-Encryption 'Recryption'
- Public key cryptography is more powerful than symmetric key cryptography because two keys allow two different functions to be separated. Proxy re-encryption splits the private key into two or more parts allowing three or more functions to be separated. This allows end-to-end security to be achieved in multi-party communications.
How secure is the Mesh?
The Mesh uses 'strong' cryptography to make Internet applications secure.
At a technical level we define 'strong' to mean, cryptographic algorithms that a widespread consensus in the field agrees present a work factor of at least 2^128 operations against all known and foreseeable attacks.