[5142] in cryptography@c2.net mail archive
Re: depleting the random number generator
daemon@ATHENA.MIT.EDU (Bill Stewart)
Mon Jul 19 13:18:57 1999
Date: Sun, 18 Jul 1999 22:22:55 -0700
To: cryptography@c2.net
From: Bill Stewart <bill.stewart@pobox.com>
Cc: John Denker <jsd@research.att.com>
In-Reply-To: <379238F7.5D17CF9F@algroup.co.uk>
At 09:28 PM 7/18/99 +0100, Ben Laurie wrote:
>The obvious way to solve the underlying problem, as I've already said,
>is to use hashcash.
>Cheers,
>
>Ben.
Hashcash is interesting in general environments - forcing the
initiator of a transaction to burn some CPU keeps them from
swamping you with attempts. But the various ipsec key exchange protocols
aren't going to provide a handle for including it.
(Too bad - you could also toss the hashcash into the entropy pool :-)
Thanks!
Bill
Bill Stewart, bill.stewart@pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639