by crypto
on 10/03/2006 15:43, 1 messages, last message: 10/03/2006 17:22, 936 views, last view: 04/18/2024 05:58, closed on 10/03/2006 19:28 |
*cryptographic hashing would be useful to determine the version of the executable. my suggestion, to permit modding, is to allow modders to modify the executable, but require clients to possess a similar hash for communicating. this way "cube 2" becomes "a channel" of gaming that permits modding and provides a method for expression.
see: cryptographic hash functions
Computer systems
In cryptographic terminology, Cryptographic hash functions and cryptographic signatures are used to add a tamper-evident layer of protection to document, often referred to as an electronic signature.
The document, email, or file to be protected is used to generate a signed hash, a number generated from the contents of the document. Any change to the document, no matter how trivial, will cause it to have a different hash, which will make the signature invalid*.
sic:
The remote server could generate its own hash and require the hash of its clients. It could broadcast the hash to the "master server" which could use the hash to generate a "protocol version number"
Yes, a cheater could sniff the hash and use the hash to generate its client-hash, but it could be time encrypted with the startup time of the server, sent to the master server, which is a private value held on the master server and not shared with the client.
|