[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: resistance to swamping attacks.



I'm no expert in cryptography, but it seems to me that what is needed is
a function which is expensive for the originator of a packet to
calculate, but cheap for the receiver to verify.  This will make sure
that the source of a swamping attack must have a much larger CPU than
the receiver.  I don't know if there are any such functions, but perhaps
the cryptographically sophisticated among us could enlighten?


Follow-Ups: References: