General approach » History » Revision 1

Revision 1/18 | Next »
Greg Burri, 04/05/2011 10:34 PM

General approach

Each file the user want to share is cut sequentially in pieces called chunk. Each chunk has the same size except the last one which can be smaller.

For each chunk there is a footprint called hash which identify the chunk. We admit that two chunks with the same hash contains the same data. The hash is computed with a cryptographic hash function like SHA-1.

Updated by Greg Burri about 13 years ago · 1 revisions