Analysis and Optimization of Cryptographically Generated Addresses View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Joppe W. Bos , Onur Özen , Jean-Pierre Hubaux

ABSTRACT

The need for nodes to be able to generate their own address and verify those from others, without relying on a global trusted authority, is a well-known problem in networking. One popular technique for solving this problem is to use self-certifying addresses that are widely used and standardized; a prime example is cryptographically generated addresses (CGA). We re-investigate the attack models that can occur in practice and analyze the security of CGA-like schemes. As a result, an alternative protocol to CGA, called CGA++, is presented. This protocol eliminates several attacks applicable to CGA and increases the overall security. In many ways, CGA++ offers a nice alternative to CGA and can be used notably for future developments of the Internet Protocol version 6. More... »

PAGES

17-32

References to SciGraph publications

  • 2003. Cryptographically Generated Addresses (CGA) in INFORMATION SECURITY
  • Book

    TITLE

    Information Security

    ISBN

    978-3-642-04473-1
    978-3-642-04474-8

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-04474-8_2

    DOI

    http://dx.doi.org/10.1007/978-3-642-04474-8_2

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1020993876


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Communications Technologies", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Technology", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne", 
              "id": "https://www.grid.ac/institutes/grid.5333.6", 
              "name": [
                "EPFL IC IIF LACAL, Station 14, CH, 1015\u00a0Lausanne, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bos", 
            "givenName": "Joppe W.", 
            "id": "sg:person.011356726653.68", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011356726653.68"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne", 
              "id": "https://www.grid.ac/institutes/grid.5333.6", 
              "name": [
                "EPFL IC IIF LACAL, Station 14, CH, 1015\u00a0Lausanne, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "\u00d6zen", 
            "givenName": "Onur", 
            "id": "sg:person.013313712055.92", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013313712055.92"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne", 
              "id": "https://www.grid.ac/institutes/grid.5333.6", 
              "name": [
                "EPFL IC ISC LCA1, Station 14, CH, 1015\u00a0Lausanne, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hubaux", 
            "givenName": "Jean-Pierre", 
            "id": "sg:person.013552656710.60", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013552656710.60"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/10958513_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011989523", 
              "https://doi.org/10.1007/10958513_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/10958513_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011989523", 
              "https://doi.org/10.1007/10958513_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359340.359342", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013337011"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/505666.505668", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044975718"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2009", 
        "datePublishedReg": "2009-01-01", 
        "description": "The need for nodes to be able to generate their own address and verify those from others, without relying on a global trusted authority, is a well-known problem in networking. One popular technique for solving this problem is to use self-certifying addresses that are widely used and standardized; a prime example is cryptographically generated addresses (CGA). We re-investigate the attack models that can occur in practice and analyze the security of CGA-like schemes. As a result, an alternative protocol to CGA, called CGA++, is presented. This protocol eliminates several attacks applicable to CGA and increases the overall security. In many ways, CGA++ offers a nice alternative to CGA and can be used notably for future developments of the Internet Protocol version 6.", 
        "editor": [
          {
            "familyName": "Samarati", 
            "givenName": "Pierangela", 
            "type": "Person"
          }, 
          {
            "familyName": "Yung", 
            "givenName": "Moti", 
            "type": "Person"
          }, 
          {
            "familyName": "Martinelli", 
            "givenName": "Fabio", 
            "type": "Person"
          }, 
          {
            "familyName": "Ardagna", 
            "givenName": "Claudio A.", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-04474-8_2", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-04473-1", 
            "978-3-642-04474-8"
          ], 
          "name": "Information Security", 
          "type": "Book"
        }, 
        "name": "Analysis and Optimization of Cryptographically Generated Addresses", 
        "pagination": "17-32", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-04474-8_2"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "6406d64702bf2b8132a6fa26eedb5adde70f865587cb9c44d8cdf762fed06bfd"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1020993876"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-04474-8_2", 
          "https://app.dimensions.ai/details/publication/pub.1020993876"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T15:20", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8672_00000256.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-04474-8_2"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04474-8_2'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04474-8_2'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04474-8_2'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04474-8_2'


     

    This table displays all metadata directly associated to this object as RDF triples.

    105 TRIPLES      23 PREDICATES      30 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-04474-8_2 schema:about anzsrc-for:10
    2 anzsrc-for:1005
    3 schema:author Na88ade1d3a544b6883a1b8165db772de
    4 schema:citation sg:pub.10.1007/10958513_3
    5 https://doi.org/10.1145/359340.359342
    6 https://doi.org/10.1145/505666.505668
    7 schema:datePublished 2009
    8 schema:datePublishedReg 2009-01-01
    9 schema:description The need for nodes to be able to generate their own address and verify those from others, without relying on a global trusted authority, is a well-known problem in networking. One popular technique for solving this problem is to use self-certifying addresses that are widely used and standardized; a prime example is cryptographically generated addresses (CGA). We re-investigate the attack models that can occur in practice and analyze the security of CGA-like schemes. As a result, an alternative protocol to CGA, called CGA++, is presented. This protocol eliminates several attacks applicable to CGA and increases the overall security. In many ways, CGA++ offers a nice alternative to CGA and can be used notably for future developments of the Internet Protocol version 6.
    10 schema:editor N0fa6a67b4dad42d19f10d8486a2f7866
    11 schema:genre chapter
    12 schema:inLanguage en
    13 schema:isAccessibleForFree true
    14 schema:isPartOf Nca8d68b2610b4b69882a7280d65cf925
    15 schema:name Analysis and Optimization of Cryptographically Generated Addresses
    16 schema:pagination 17-32
    17 schema:productId N0182e2e65af7436e84d42023a1da20e9
    18 N14d734d552804f2f97bf968b330d9e09
    19 Ndaeb71d89e864ca0bce6b2638a0717d9
    20 schema:publisher Nf721165496994563945d25cccdd2f449
    21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020993876
    22 https://doi.org/10.1007/978-3-642-04474-8_2
    23 schema:sdDatePublished 2019-04-15T15:20
    24 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    25 schema:sdPublisher Nba1568beb7954026abcaf282366885b2
    26 schema:url http://link.springer.com/10.1007/978-3-642-04474-8_2
    27 sgo:license sg:explorer/license/
    28 sgo:sdDataset chapters
    29 rdf:type schema:Chapter
    30 N0182e2e65af7436e84d42023a1da20e9 schema:name readcube_id
    31 schema:value 6406d64702bf2b8132a6fa26eedb5adde70f865587cb9c44d8cdf762fed06bfd
    32 rdf:type schema:PropertyValue
    33 N0fa6a67b4dad42d19f10d8486a2f7866 rdf:first Ne850dc2bf7224bca87fc216017f5b739
    34 rdf:rest N5c64f95a419f4bf1a5578ed1b9e3eb39
    35 N14d734d552804f2f97bf968b330d9e09 schema:name doi
    36 schema:value 10.1007/978-3-642-04474-8_2
    37 rdf:type schema:PropertyValue
    38 N2db497e9353c408fbafeba90cd3eba52 schema:familyName Ardagna
    39 schema:givenName Claudio A.
    40 rdf:type schema:Person
    41 N5c64f95a419f4bf1a5578ed1b9e3eb39 rdf:first Naa1e0b3b5d344334b10b09d0f34ff5ec
    42 rdf:rest Nf3e4cb2f952f418fa769b5859a90fa6b
    43 N65638af8791845139ff279464f2b80a0 rdf:first N2db497e9353c408fbafeba90cd3eba52
    44 rdf:rest rdf:nil
    45 N9c9e7583b2134bc68bbff83c09220a7c schema:familyName Martinelli
    46 schema:givenName Fabio
    47 rdf:type schema:Person
    48 Na88ade1d3a544b6883a1b8165db772de rdf:first sg:person.011356726653.68
    49 rdf:rest Nbf9fc6f6e0b749a281d7446b25969b94
    50 Naa1e0b3b5d344334b10b09d0f34ff5ec schema:familyName Yung
    51 schema:givenName Moti
    52 rdf:type schema:Person
    53 Nba1568beb7954026abcaf282366885b2 schema:name Springer Nature - SN SciGraph project
    54 rdf:type schema:Organization
    55 Nbf9fc6f6e0b749a281d7446b25969b94 rdf:first sg:person.013313712055.92
    56 rdf:rest Ned7fe5c23b2b431789e79536a5032bbd
    57 Nca8d68b2610b4b69882a7280d65cf925 schema:isbn 978-3-642-04473-1
    58 978-3-642-04474-8
    59 schema:name Information Security
    60 rdf:type schema:Book
    61 Ndaeb71d89e864ca0bce6b2638a0717d9 schema:name dimensions_id
    62 schema:value pub.1020993876
    63 rdf:type schema:PropertyValue
    64 Ne850dc2bf7224bca87fc216017f5b739 schema:familyName Samarati
    65 schema:givenName Pierangela
    66 rdf:type schema:Person
    67 Ned7fe5c23b2b431789e79536a5032bbd rdf:first sg:person.013552656710.60
    68 rdf:rest rdf:nil
    69 Nf3e4cb2f952f418fa769b5859a90fa6b rdf:first N9c9e7583b2134bc68bbff83c09220a7c
    70 rdf:rest N65638af8791845139ff279464f2b80a0
    71 Nf721165496994563945d25cccdd2f449 schema:location Berlin, Heidelberg
    72 schema:name Springer Berlin Heidelberg
    73 rdf:type schema:Organisation
    74 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Technology
    76 rdf:type schema:DefinedTerm
    77 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
    78 schema:name Communications Technologies
    79 rdf:type schema:DefinedTerm
    80 sg:person.011356726653.68 schema:affiliation https://www.grid.ac/institutes/grid.5333.6
    81 schema:familyName Bos
    82 schema:givenName Joppe W.
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011356726653.68
    84 rdf:type schema:Person
    85 sg:person.013313712055.92 schema:affiliation https://www.grid.ac/institutes/grid.5333.6
    86 schema:familyName Özen
    87 schema:givenName Onur
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013313712055.92
    89 rdf:type schema:Person
    90 sg:person.013552656710.60 schema:affiliation https://www.grid.ac/institutes/grid.5333.6
    91 schema:familyName Hubaux
    92 schema:givenName Jean-Pierre
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013552656710.60
    94 rdf:type schema:Person
    95 sg:pub.10.1007/10958513_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011989523
    96 https://doi.org/10.1007/10958513_3
    97 rdf:type schema:CreativeWork
    98 https://doi.org/10.1145/359340.359342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013337011
    99 rdf:type schema:CreativeWork
    100 https://doi.org/10.1145/505666.505668 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044975718
    101 rdf:type schema:CreativeWork
    102 https://www.grid.ac/institutes/grid.5333.6 schema:alternateName École Polytechnique Fédérale de Lausanne
    103 schema:name EPFL IC IIF LACAL, Station 14, CH, 1015 Lausanne, Switzerland
    104 EPFL IC ISC LCA1, Station 14, CH, 1015 Lausanne, Switzerland
    105 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...