User Tools

Site Tools


renter:renting



Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
renter:renting [2017/03/24 21:32]
Zach Herbert
renter:renting [2018/01/04 08:31] (current)
Fornax [Uploading and Downloading] correction chunk sizes
Line 1: Line 1:
 ====== Renting ====== ====== Renting ======
 +
 +//For a practical guide about how to use the UI for renting, check [[renter:using_the_ui_for_renting|Using the UI for renting]]//
  
 Renters pay hosts to store their data on the Sia network. Renters pay hosts to store their data on the Sia network.
Line 14: Line 16:
 Sia uses encryption and erasure coding to ensure that files are private and remain available even if hosts go offline. Sia uses encryption and erasure coding to ensure that files are private and remain available even if hosts go offline.
  
-The uploading process is as follows. First, the file is striped into //chunks// of 40MB. Reed-Solomon erasure coding is then applied on each chunk, expanding them into 30 //pieces// of 4MB. Erasure coding is like an M-of-N multisig protocol, but for data: out of //N// total pieces, only //M// are needed to recover the full 40MB chunk. This ensures a high level of redundancy, much greater than traditional replication.+The uploading process is as follows. First, the file is striped into //chunks// of 40MiB. Reed-Solomon erasure coding is then applied on each chunk, expanding them into 30 //pieces// of 4MiB. Erasure coding is like an M-of-N multisig protocol, but for data: out of //N// total pieces, only //M// are needed to recover the full 40MiB chunk. This ensures a high level of redundancy, much greater than traditional replication.
  
 Each piece is then encrypted with the Twofish algorithm. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Nonetheless, this algorithm is considered very secure. Each piece is then encrypted with the Twofish algorithm. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Nonetheless, this algorithm is considered very secure.
renter/renting.1490391173.txt.gz · Last modified: 2017/03/24 21:32 by Zach Herbert