[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: resistance to swamping attacks.



> > I'm no expert in cryptography, but it seems to me that what is needed is
> > a function which is expensive for the originator of a packet to
> > calculate, but cheap for the receiver to verify.  This will make sure
> > that the source of a swamping attack must have a much larger CPU than
> > the receiver.  I don't know if there are any such functions, but perhaps
> > the cryptographically sophisticated among us could enlighten?
> 
> A simple imbalance in "expense" isn't enough -- what if the attacker
> does a lot of precomputation before launching the attack?

Aren't authentication functions symmetric, almost by definition?

Joe
----------------------------------------------------------------------
Joe Touch - touch@isi.edu		    http://www.isi.edu/~touch/
ISI / Project Leader, ATOMIC-2, LSAM       http://www.isi.edu/atomic2/
USC / Research Assistant Prof.                http://www.isi.edu/lsam/


Follow-Ups: