IPv6 Cryptographically Generated Address: Analysis and Optimization

Junaid Latief Shah, J. Parvez
{"title":"IPv6 Cryptographically Generated Address: Analysis and Optimization","authors":"Junaid Latief Shah, J. Parvez","doi":"10.1145/2979779.2979781","DOIUrl":null,"url":null,"abstract":"Cryptographically generated address (CGA) is a prime inherent element of SEND protocol introduced in IPv6.CGA works without relying on any trusted third party authority or Public Key Infrastructure (PKI).CGA find their application in proving address ownership and prevent spoofing or theft of IPv6 addresses by binding senders public key with the generated address. Though CGA is a promising technique and offers substantial amount of security, it does possess some limitations and performance bottlenecks. CGA is computationally intensive determined by the security parameter 'sec' and bandwidth gobbling due to use of RSA keys. For a higher value of 'sec', there is no guarantee on termination of brute force search for modifier. This paper evaluates the performance and discusses possible techniques that can be used in optimizing the use of IPv6 CGA. The techniques discussed are the possible modifications to the standard RFC 3972.These include reducing the granularity factor of sec from 16 to 8, replacing RSA with ECC and ECSDSA, using SHA-256 hash function instead of SHA-1 and including subnet prefix in the calculation of CGA. The paper also compares the modified CGA with standard CGA and advocates the reasons for incorporating these changes so that enhanced hybrid version of CGA can be obtained.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2979779.2979781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Cryptographically generated address (CGA) is a prime inherent element of SEND protocol introduced in IPv6.CGA works without relying on any trusted third party authority or Public Key Infrastructure (PKI).CGA find their application in proving address ownership and prevent spoofing or theft of IPv6 addresses by binding senders public key with the generated address. Though CGA is a promising technique and offers substantial amount of security, it does possess some limitations and performance bottlenecks. CGA is computationally intensive determined by the security parameter 'sec' and bandwidth gobbling due to use of RSA keys. For a higher value of 'sec', there is no guarantee on termination of brute force search for modifier. This paper evaluates the performance and discusses possible techniques that can be used in optimizing the use of IPv6 CGA. The techniques discussed are the possible modifications to the standard RFC 3972.These include reducing the granularity factor of sec from 16 to 8, replacing RSA with ECC and ECSDSA, using SHA-256 hash function instead of SHA-1 and including subnet prefix in the calculation of CGA. The paper also compares the modified CGA with standard CGA and advocates the reasons for incorporating these changes so that enhanced hybrid version of CGA can be obtained.
IPv6加密生成地址:分析与优化
加密生成地址(cryptographic generated address, CGA)是IPv6中引入的SEND协议的主要固有元素。CGA的工作不依赖于任何可信的第三方权威机构或公钥基础设施(PKI)。通过将发送方公钥与生成的地址绑定,CGA在证明地址所有权和防止欺骗或窃取IPv6地址方面得到了应用。尽管CGA是一种很有前途的技术,并提供了大量的安全性,但它确实存在一些限制和性能瓶颈。CGA是计算密集型的,由安全参数“sec”决定,并且由于使用RSA密钥而导致带宽占用。对于较大的'sec'值,不能保证终止对修饰符的暴力搜索。本文评估了性能,并讨论了可用于优化IPv6 CGA使用的可能技术。所讨论的技术是对标准RFC 3972的可能修改。这些措施包括将sec的粒度因子从16降低到8,用ECC和ECSDSA代替RSA,使用SHA-256哈希函数代替SHA-1,以及在计算CGA时包含子网前缀。本文还对改进后的CGA与标准CGA进行了比较,并提出了加入这些变化的原因,以获得增强的混合CGA版本。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信