Hi Joe

On Wed, Sep 30, 2015 at 08:28:21AM -0400, Joe Abley wrote:
> Surely the threat models here depend on the algorithm. I am no
> cryptographer, but it seems reasonable to mention the characteristics
> of the hash function that are important to minimise the risk of this
> kind of attack, especially when there are other motivations in
> choosing an algorithm (such as the speed at which it can be
> calculated) that might weaken the mechanism.

In the git repository, Appendix A now mentions the characteristics of
the hash function that are important to minimise the risk of this kind
of attack. A text version of the current copy can be viewed here:

http://users.isc.org/~muks/draft-muks-dnsop-dns-message-checksums.txt

                Mukund

Attachment: pgpcdgxfo9ScO.pgp
Description: PGP signature

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to