> But I don't agree with you in "each trial is just as complex as finding a
> matching CGA address."
It is just as complex -- unless of course someone cracks the hash algorithm.
Absent a published crack, we have to assume that the best method for the
attacker is an exhaustive search of salt va
> To: Christian Huitema
> Cc: ipv6@ietf.org; Jari Arkko
> Subject: 答复: RE: about security level evaluation of draft-
> zhou-6man-mhash-cga-00
>
>
> Regards~~~
>
> -Sujing Zhou
>
> Christian Huitema 写于 2012-03-27 23:00:09:
>
> > > Well, I think it
Subject: 答复: RE: about security level evaluation of draft-zhou-6man-mhash-cga-00
Regards~~~
-Sujing Zhou
Christian Huitema mailto:huit...@microsoft.com>> 写于
2012-03-27 23:00:09:
> > Well, I think it is quite a simple trade-off. Increasing Sec
> increases computational effort on both
Regards~~~
-Sujing Zhou
Christian Huitema 写于 2012-03-27 23:00:09:
> > Well, I think it is quite a simple trade-off. Increasing Sec
> increases computational effort on both sides by equal amount.
> Increasing the length of
> > the hash increases computational effort only on the attacker side.
Christian,
Well, I think it is quite a simple trade-off. Increasing Sec increases
computational effort on both sides by equal amount. Increasing the length of
the hash increases computational effort only on the attacker side. As a result,
the hash bits are relatively valuable.
Jari, the effec
> Well, I think it is quite a simple trade-off. Increasing Sec increases
> computational effort on both sides by equal amount. Increasing the length of
> the hash increases computational effort only on the attacker side. As a
> result, the hash bits are relatively valuable.
Jari, the effect of
Regards~~~
-Sujing Zhou
Jari Arkko 写于 2012-03-27 16:21:52:
> Well, I think it is quite a simple trade-off. Increasing Sec
> increases computational effort on both sides by equal amount.
> Increasing the length of the hash increases computational effort
> only on the attacker side. As a resul
Well, I think it is quite a simple trade-off. Increasing Sec increases
computational effort on both sides by equal amount. Increasing the length of
the hash increases computational effort only on the attacker side. As a result,
the hash bits are relatively valuable.
The trade-off that we have