spf-discuss
[Top] [All Lists]

RE: Attacking Domain Keys

2004-11-30 10:37:38

[mailto:owner-spf-discuss(_at_)v2(_dot_)listbox(_dot_)com] On Behalf Of Seth 
Goodman

As is the implementation of any other algorithm.  RSA signature 
validation is a very CPU-intensive algorithm that 
unfairly burdens 
the recipient. HMAC-SHA1 signatures are much faster, and you can 
optimize both to your heart's content and still come up with the 
same result.

How do trolls perform the necessary key distribution?


I was not suggesting using an HMAC in DK or any other PK 

Oh yes you were, see your original post.

scheme, nor have I ever.  As you are undoubtedly aware, there 
are other signature schemes besides public key cryptography.  

I am aware of a great many signature schemes, with the exception of digest /
MAC based schemes all are based on mathematics that are at least as complex
as public key.

The eliptic curve variations of RSA offer a marginal speed improvement but
only if you believe certain claims as to the difficulty of performing
certain operations in a field that is considerably less well understood than
discrete math.

Some of them don't require key distribution at all.  We have 
discussed it for a long time but I suppose you missed it.  
Please read the archives.

Ah reference to non-existent/ambiguous citation, a favorite tactic of
trolls.

You made the assertion, the onus is on you to back up your claim. 


<Prev in Thread] Current Thread [Next in Thread>