3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Hash optimization for cryptographically generated address

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554441,
        author={T. Rajendran and K.V. Sreenaath},
        title={Hash optimization for cryptographically generated address},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={component; CGA; Hash optimization},
        doi={10.1109/COMSWA.2008.4554441}
    }
    
  • T. Rajendran
    K.V. Sreenaath
    Year: 2008
    Hash optimization for cryptographically generated address
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554441
T. Rajendran1,*, K.V. Sreenaath2,*
  • 1: Security Technology Group, Motorola India Private Limited. Bangalore, India
  • 2: Research Scholar
*Contact email: rajendran.thirupugal@gmail.com, sreenaathkv@gmail.com

Abstract

Cryptographically generated addresses (CGA) are IPv6 addresses where the interface address bits are generated by hashing the address ownerpsilas public key [1]. Owner of the address uses the corresponding private key and signs messages sent from that address to assert ownership of the address. CGA is generated by recursive hashing and conformance of the computed hash depending upon the security level. In this paper we propose restructuring of the CGA format and optimization of hash computation of CGA using SHA-1[2] and MD5[3].