[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006



On 24-jul-2006, at 10:02, Francis Dupont wrote:

   Too weak for what?
=> direct attack against the hash (the O(2^56)).
Hm, even if you build a machine that can test 1000 hashes in parallel  
every microsecond, it will take you more than a year on average to  
find a hash collision. And when you've found one, you get to redirect  
traffic, which is only a denial of service attack. If you have enough  
money to build such a hash breaking machine and enough patience to  
wait for it to work, I'm sure other, more dangerous avenues of attack  
are also open to you...
An interesting issue is that after some 10 million hosts start using  
HBA, there is a 50% chance of two hosts using the same hash, i.e.,  
sort of a distributed birthday attack.