This software package uses strong cryptography, so even if it is created, maintained and distributed from liberal
countries in Europe (where it is legal to do this), it falls under certain export/import and/or use restrictions in
some other parts of the world.
PLEASE REMEMBER THAT EXPORT/IMPORT AND/OR USE OF STRONG CRYPTOGRAPHY SOFTWARE, PROVIDING CRYPTOGRAPHY HOOKS OR EVEN
JUST COMMUNICATING TECHNICAL DETAILS ABOUT CRYPTOGRAPHY SOFTWARE IS ILLEGAL IN SOME PARTS OF THE WORLD. SO, WHEN YOU
IMPORT THIS PACKAGE TO YOUR COUNTRY, RE-DISTRIBUTE IT FROM THERE OR EVEN JUST EMAIL TECHNICAL SUGGESTIONS OR EVEN
SOURCE PATCHES TO THE AUTHOR OR OTHER PEOPLE YOU ARE STRONGLY ADVISED TO PAY CLOSE ATTENTION TO ANY EXPORT/IMPORT
AND/OR USE LAWS WHICH APPLY TO YOU. THE AUTHORS OF ZETAGRID ARE NOT LIABLE FOR ANY VIOLATIONS YOU MAKE HERE.
SO BE CAREFUL, IT IS YOUR RESPONSIBILITY.
Every task has a different digital signature based on ElGamal signature scheme with keys which have a length of 1024 Bit.
Only the customer knows the private key of the digital signature which is not in the network.
Every transfer of a result uses a key establishment protocol (half-certified Diffie-Hellman) with keys which have a length of 1024 Bit.
Only the Result-Verifier knows the private key of the protocol (ElGamal key agreement).
Restricted Layer Access
For technical reasons we transfer the following information from the users computer:
Operating system type, host name, processor type, filelist of the files in the zeta directory,
the e-mail address you put into the zeta configuration and of course the results of the computations.
We do this to be able to update the zeta code on the users computer automatically with the correct program code and to create