[Hipsec] Re: About the HIP security model (was Re: New multi6 draft: WIMP)
pekka.nikander@nomadiclab.com (Pekka Nikander) Mon, 16 February 2004 04:45 UTC
From: pekka.nikander@nomadiclab.com
Date: Mon, 16 Feb 2004 04:45:01 +0000
Subject: [Hipsec] Re: About the HIP security model (was Re: New multi6 draft: WIMP)
In-Reply-To: <5EF7D95E17BDAD4A968C812E5ABC390B011082BB@KC-MAIL4.kc.umkc.edu>
References: <5EF7D95E17BDAD4A968C812E5ABC390B011082BB@KC-MAIL4.kc.umkc.edu>
Message-ID: <A1550188-606A-11D8-A37D-000393CE1E8C@nomadiclab.com>
X-Date: Mon Feb 16 04:45:01 2004
> ... So, I would > expect the puzzle to vary depending on the CPU power (i.e. if high CPU > power...it should solve fast.) I did see a work by MSR Penny Black > folks > addressing this aspect. We did consider Mike Burrow's memory bound functions about a year ago, after their publication at NDSS. However, the general feeling was that they were too new (too little analysis) and too unclear from IPR point of view. Hence, the decision back then was to use SHA-1 for now. Of course, the decision can be reversed if it becomes clear that the memory bound functions (or some other form of puzzles) works better, and is sufficiently IPR free. --Pekka N.
- [Hipsec] About the HIP security model (was Re: Ne… Pekka Nikander
- [Hipsec] RE: About the HIP security model (was Re… Ayyasamy, Senthilkumar UMKC-Student
- [Hipsec] Re: About the HIP security model (was Re… Pekka Nikander
- [Hipsec] HIP security model senthil ayyasamy
- [Hipsec] HIP security model Julien Laganier
- [Hipsec] HIP security model Jari Arkko
- [Hipsec] HIP security model senthil ayyasamy
- [Hipsec] HIP security model Erik Nordmark