Security
 
 
  ZetaGrid  
  News  
  Statistics  
  Software  
  Downloads  
  FAQ  
  Screenshots  
Security
  Source Code  
  Publications  
  Forum  
  Links  
spacer gif
Security and Privacy
This software package uses strong cryptography, so even if it is created, maintained and distributed from liberal countries in Europe (where it is legal to do this), it falls under certain export/import and/or use restrictions in some other parts of the world.

PLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY SOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN JUST COMMUNICATING TECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME PARTS OF THE WORLD. SO, WHEN YOU IMPORT THIS PACKAGE TO YOUR COUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL SUGGESTIONS OR EVEN SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE YOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT AND/OR USE LAWS WHICH APPLY TO YOU. THE AUTHORS OF ZETAGRID ARE NOT LIABLE FOR ANY VIOLATIONS YOU MAKE HERE. SO BE CAREFUL, IT IS YOUR RESPONSIBILITY.

Every task has a different digital signature based on ElGamal signature scheme with keys which have a length of 1024 Bit. Only the customer knows the private key of the digital signature which is not in the network.
Every transfer of a result uses a key establishment protocol (half-certified Diffie-Hellman) with keys which have a length of 1024 Bit. Only the Result-Verifier knows the private key of the protocol (ElGamal key agreement).
Restricted Layer Access
Security Architecture

For technical reasons we transfer the following information from the users computer: Operating system type, host name, processor type, filelist of the files in the zeta directory, the e-mail address you put into the zeta configuration and of course the results of the computations. We do this to be able to update the zeta code on the users computer automatically with the correct program code and to create various statistics.