[11341] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: An authentication question

daemon@ATHENA.MIT.EDU (Roy M.Silvernail)
Tue Aug 6 10:20:41 2002

From: Roy M.Silvernail <roy@sendai.scytale.com>
Reply-To: roy@scytale.com
To: cryptography@wasabisystems.com
Date: Tue, 6 Aug 2002 05:47:34 -0500
In-Reply-To: <20020805222103.GB34063@colon.colondot.net>

On Monday 05 August 2002 05:21 pm, you wrote:
> On Mon, Aug 05, 2002 at 04:44:28PM -0400, Jack Lloyd wrote:
> > In the second version, any random user (or script) could upload very
> > large files, wasting your bandwidth, and also CPU time when you check the
> > sig. Or lots and lots of really small files, which would swamp your
> > CPU(s) trying to check 500 sigs a second (makes for a good DDOS).
>
> public key operations are significantly faster than private key ones. So it
> is far easier to check 500 sigs than to generate them in the first place.

Yes, but for a DoS attack, the signatures need not be good.  They only need a 
well-formed envelope.
-- 
Roy M. Silvernail     [ ]     roy@scytale.com
DNRC Minister Plenipotentiary of All Things Confusing, Software Division
    PGP Key 0x1AF39331 :  71D5 2EA2 4C27 D569  D96B BD40 D926 C05E
                 Key available from pubkey@scytale.com
            I charge to process unsolicited commercial email

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post