Shortcut digital signature verification failure

Bill Frantz frantz at pwpconsult.com
Sat Jun 22 11:24:07 EDT 2002


At 2:18 PM -0400 6/21/02, Ed Gerck wrote:
>A DoS would not pitch one client against one server. A distributed attack
>using several clients could overcome any single server advantage.  A
>scalable strategy would be a queue system for distributing load to
>a pool of servers and a rating system for early rejection of repeated
>bad queries from a source. The rating system would reset the source rating
>after a pre-defined time, much like anti-congestion mechanisms on the Net.
>Fast rejection of bogus signatures would help, but not alone.

I had already thought of this approach, but wanted to add to it a CPU limit
on the client end.  Hash cash with a server provided problem seems a good
approach there.

Cheers - Bill

-------------------------------------------------------------------------
Bill Frantz           | The principal effect of| Periwinkle -- Consulting
(408)356-8506         | DMCA/CBDTPA is to      | 16345 Englewood Ave.
frantz at pwpconsult.com | prevent fair use.      | Los Gatos, CA 95032, USA



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list