Resources

Open Specifications

 

I. Architecture draft-hallambaker-mesh-architecture-19.html

Provides an overview of the Mesh as a system and the relationship between its constituent parts.

II. Uniform Data Fingerprint [draft-hallambaker-mesh-udf].

Describes the UDF format used to represent cryptographic nonces, keys and content digests in the Mesh and the use of Encrypted Authenticated Resource Locators (EARLs) and Strong Internet Names (SINs) that build on the UDF platform.

III. Data at Rest Encryption [draft-hallambaker-mesh-dare].

Describes the cryptographic message and append-only sequence formats used in Mesh applications and the Mesh Service protocol.

IV. Schema Reference [draft-hallambaker-mesh-schema].

Describes the syntax and semantics of Mesh Profiles, Catalog and Spool Entries and Mesh Messages and their use in Mesh Applications.

V. Protocol Reference [draft-hallambaker-mesh-protocol].

Describes the Mesh Service Protocol.

VI. Reliable User Datagram [draft-hallambaker-mesh-rud].

Describes the Mesh presentation and transport layer.

VII. Mesh Callsign Service [draft-hallambaker-mesh-callsign].

Describes the Mesh Callsign Service that supports mapping of Mesh callsigns to the corresponding Mesh Service Provider.

VIII. Security Considerations [draft-hallambaker-mesh-security]

Describes the recommended and required algorithm suites and the security considerations for the Mesh protocol suite.

IX. Cryptographic Algorithms [draft-hallambaker-mesh-security]

Describes the cryptographic algorithm suites used in the Mesh and the implementation of Multi-Party Encryption and Multi-Party Key Generation used in the Mesh.

Open Source Reference Code

 

Repositories

  • Mathematical Mesh

    • Support Libraries

    • Mesh Libraries

    • Mesh Command Line Applications

    • Test Suites

Presentations

  • Demonstration Reels

    • Service

    • Single User / Multiple Device Examples

    • Multiple User Examples

  • Cryptography Tutorial

Coming soon

  • Fixing Passwords

  • Beyond Zero Trust

  • Beyond Identity

  • Making IoT work for the customer

  • Threshold Cryptography

Old

  • Architecture videos [old]