DocumentCode :
1830967
Title :
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
Author :
Jerschow, Yves Igor ; Mauve, Martin
Author_Institution :
Inst. of Comput. Sci., Heinrich Heine Univ., Dusseldorf, Germany
fYear :
2011
fDate :
22-26 Aug. 2011
Firstpage :
135
Lastpage :
142
Abstract :
Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely on public key cryptography and perform expensive authentication handshakes may be an easy target. A well-known countermeasure against DoS attacks are client puzzles. The victimized server demands from the clients to commit computing resources before it processes their requests. To get service, a client must solve a cryptographic puzzle and submit the right solution. Existing client puzzle schemes have some drawbacks. They are either parallelizable, coarse-grained or can be used only interactively. In case of interactive client puzzles where the server poses the challenge an attacker might mount a counterattack on the clients by injecting fake packets containing bogus puzzle parameters. In this paper we introduce a novel scheme for client puzzles which relies on the computation of square roots modulo a prime. Modular square root puzzles are non-parallelizable, i.e., the solution cannot be obtained faster than scheduled by distributing the puzzle to multiple machines or CPU cores, and they can be employed both interactively and non-interactively. Our puzzles provide polynomial granularity and compact solution and verification functions. Benchmark results demonstrate the feasibility of our approach to mitigate DoS attacks on hosts in 1 or even 10 GBit networks. In addition, we show how to raise the efficiency of our puzzle scheme by introducing a bandwidth-based cost factor for the client.
Keywords :
cryptographic protocols; public key cryptography; DoS attacks; authentication handshakes; bandwidth-based cost factor; bogus puzzle parameters; computing resources; cryptographic puzzle; denial of service attacks; modular square root puzzles; noninteractive client puzzles; nonparallelizable client puzzles; polynomial granularity; public key cryptography; server demands; Authentication; Benchmark testing; Computer crime; Cryptography; Polynomials; Protocols; Servers; Denial of Service (DoS); authentication; client puzzles; computational puzzles; network protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
Conference_Location :
Vienna
Print_ISBN :
978-1-4577-0979-1
Electronic_ISBN :
978-0-7695-4485-4
Type :
conf
DOI :
10.1109/ARES.2011.27
Filename :
6045925
Link To Document :
بازگشت