2003
DOI: 10.1007/10958513_3
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographically Generated Addresses (CGA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
174
0

Year Published

2004
2004
2017
2017

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 179 publications
(175 citation statements)
references
References 13 publications
1
174
0
Order By: Relevance
“…Although 46 bits of entropy may be enough to provide privacy in such cases, 59 or more bits of entropy would be needed if addresses are used to provide security against attacks such as spoofing, as CGAs [RFC3972] and HBAs [RFC5535] do, since attacks are not limited by ICMP rate limiting but by the processing power of the attacker. See those RFCs for more discussion.…”
Section: Amount Of Entropy Needed In Global Addressesmentioning
confidence: 99%
“…Although 46 bits of entropy may be enough to provide privacy in such cases, 59 or more bits of entropy would be needed if addresses are used to provide security against attacks such as spoofing, as CGAs [RFC3972] and HBAs [RFC5535] do, since attacks are not limited by ICMP rate limiting but by the processing power of the attacker. See those RFCs for more discussion.…”
Section: Amount Of Entropy Needed In Global Addressesmentioning
confidence: 99%
“…o CGA: The Cryptographically Generated Address format [RFC3972] is heavily based on a /64 interface identifier. [RFC3972] has defined a detailed algorithm showing how to generate a 64-bit interface identifier from a public key and a 64-bit subnet prefix.…”
Section: Interaction With Ipv6 Specificationsmentioning
confidence: 99%
“…[RFC3972] has defined a detailed algorithm showing how to generate a 64-bit interface identifier from a public key and a 64-bit subnet prefix. Changing the /64 boundary would certainly invalidate the current CGA definition.…”
Section: Interaction With Ipv6 Specificationsmentioning
confidence: 99%
“…In [2], T. Aura proposed how that one could use a public key to generate the interface identifier (ID) portion for the IPv6 address. He calls these addresses Cryptographically Generated Addresses (CGAs).…”
Section: Related Workmentioning
confidence: 99%