[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New multi6 draft: WIMP
> On 2-feb-04, at 12:30, Jukka Ylitalo wrote:
>
> > A short hash chain generation is a quite fast operation compared to
> > signature calculation. (If I remember correct, e.g., computing SHA1
> > five times over a 160bit string takes under 0.5 ms with 2Ghz pentium.)
> > The operation is efficient and makes it more diffucult for an attacker
> > to cause a DoS situation.
>
> Actually this is pretty poor. I seem to remember that a significantly
> slower Pentium can do 2000 DSA signature checks per second. Being able
> to bring down a host with just 2000 packets per second would be a very
> bad thing, as this is easily accomplished over 10 Mbps ethernet (approx
> 500 byte packets).
I would be interesting in seeing some apple-to-apple comparisons
between different security algorithms that might apply to multi6 solutions:
One is an anonymous DH exchange - basically the purpose-built keys approach -
how much CPU to do the modular exponentiation?
Another one is a public key signature (and verification?)
A third is performing 5 SHA1 hashes of 160 bits.
If I had a better feel for the relative CPU cost of those 3 operations it
would be easier for me to understand the performance/DoS aspects of these
schemes.
Erik