Research Article
Hash optimization for cryptographically generated address
@INPROCEEDINGS{10.1109/COMSWA.2008.4554441, author={T. Rajendran and K.V. Sreenaath}, title={Hash optimization for cryptographically generated address}, proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE}, publisher={IEEE}, proceedings_a={COMSWARE}, year={2008}, month={6}, keywords={component; CGA; Hash optimization}, doi={10.1109/COMSWA.2008.4554441} }
- T. Rajendran
K.V. Sreenaath
Year: 2008
Hash optimization for cryptographically generated address
COMSWARE
IEEE
DOI: 10.1109/COMSWA.2008.4554441
Abstract
Cryptographically generated addresses (CGA) are IPv6 addresses where the interface address bits are generated by hashing the address ownerpsilas public key [1]. Owner of the address uses the corresponding private key and signs messages sent from that address to assert ownership of the address. CGA is generated by recursive hashing and conformance of the computed hash depending upon the security level. In this paper we propose restructuring of the CGA format and optimization of hash computation of CGA using SHA-1[2] and MD5[3].
Copyright © 2008–2024 IEEE