The process of randomly generating and calculating a public key for every brute-force attempt will slow the process considerably. However, for further key stretching, perhaps many iterations of SHA-* et al. is not the best option. Since web servers may be processing thousands of new connections per second, thousands of iterations of SHA and co. per connection may be prohibitively time-intensive for servers to implement. At the same time, attackers with GPUs/FPGAs/ASICs will have an advantage of several orders of magnitude. Perhaps in this case, it would be wise to leverage a universally slow algorithm like Scrypt. It's not more difficult to implement than SHA et al. but it's slower to brute-force with dedicated crypto hardware.
On Jun 12, 2013, at 5:21, Eugen Leitl <[email protected]> wrote: > ----- Forwarded message from Jim Small <[email protected]> ----- > > Date: Wed, 12 Jun 2013 03:31:10 +0000 > From: Jim Small <[email protected]> > To: IPv6 Hackers Mailing List <[email protected]> > Subject: Re: [ipv6hackers] opportunistic encryption in IPv6 > Reply-To: IPv6 Hackers Mailing List <[email protected]> > >>> Here's an interesting question more relevant to the list and the paper >> though - are IPv6 CGAs useful? It seems like SeND is dead. But does anyone >> on the list think that CGAs could provide a useful competitive advantage for >> IPv6 over IPv4? Are these a useful building block? >> >> I believe CGAs solves PKI problem entirely. If using CGAs one does not need >> any PKI or CA certificate at all. > > True as long as you don't need authentication. But I have to concede, the > whole point of OE is just to encrypt the traffic. > >> Each node having CGA can give self signed certificate. The certificate is >> used >> only to extract public key (PK), modifier, collision counter and any >> extension >> fields. >> >> Extracted information can be used to verify that host address is valid CGA >> with the given public key. >> >> Next step is symmetric key negotiation. If during key negotiation messages >> are encrypted with the specified public key then only node having the >> corresponding private key can decrypt key negotiation messages. >> >> This step ensures that MITM is not possible if you are using CGA generated >> not from your own public/private key pair. If you use your own public/private >> keys then you no longer can easily choose your address. >> >> If using CGA+IPSEC then IKE daemon can do the key negotiation part when >> given authenticated public key. >> >> In SEND PKI is used only to protect from rogue routers. Only certificates >> signed by the CA should be able to send router advertisements. >> >> TLDR: >> For address authentication (protection against MITM) when using CGA no >> PKI is needed. > > Per RFC 3972, "CGAs are not certified." I read the RFC as assuming a strong > hash and secure private key, once someone uses a CGA someone else can't > hijack/impersonate that address. So they are great for unauthenticated > encryption. > >> CGAs is holy grail for opportunistic encryption. Node can immediately start >> using opportunistic encryption by generating self signed certificate and CGA. >> >>> One thing I wonder about is a 64 bit hash is pretty small - I wonder > if >>> that >> is sufficiently complex to provide security for the coming > decade+? >> >> When generating CGA you can choose security level which allows to slow >> down brute force attacks (search for modifiers which would generate specific >> CGA address). >> >> Security level is encoded in the first three bits of the address. >> Because of that CGAs with lower security does not overlap with stronger >> CGAs. > > True, but I wonder how well this fairs against modern massive parallel GPU > crackers. SHA-1 is a weak hash. Would be nice to see an update using > SHA-2/SHA-3 and to mandate longer key lengths - say >= 2048 bits. Otherwise > doesn't it seem like we're going down the WEP path again? > > Still - it's a great point, CGAs do seem well suited for OE if you can live > with the limitations. Is there anything that currently supports this? I'm > wondering how much IPv6 market value this has... > > --Jim > > > _______________________________________________ > Ipv6hackers mailing list > [email protected] > http://lists.si6networks.com/listinfo/ipv6hackers > > ----- End forwarded message ----- > -- > Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org > AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5 > _______________________________________________ > cryptography mailing list > [email protected] > http://lists.randombit.net/mailman/listinfo/cryptography
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
