[346] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: The Digest

daemon@ATHENA.MIT.EDU (bmanning@isi.edu)
Wed Jan 25 17:21:19 1995

From: bmanning@isi.edu
To: www-security@ns2.rutgers.edu
Date: Wed, 25 Jan 1995 09:35:19 -0800 (PST)
In-Reply-To: <9501251549.AA18552@hopf.math.nwu.edu> from "John Franks" at Jan 25, 95 09:49:52 am
Reply-To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu


In all these activities, you might take a look at the following
internet-draft:

draft-touch-md5-performance-00.txt


Here is the abstract:

ABSTRACT

MD5  is an authentication algorithm, and  has been proposed as
one authentication  option  in  IPv6.  When  enabled,  the MD5
algorithm operates  over the  entire  data  packet,  including
header. We are concerned with how  fast MD5 can be implemented
in software and hardware,  and whether it supports the network
bandwidth we're installing here at ISI. We have found that MD5
cannot be implemented in existing hardware technology at rates
in excess of 267 Mbps,  and  cannot be implemented feasibly at
rates in excess of 70  Mbps  in special-purpose CMOS hardware.
These rates cannot support ISI's ATOMIC LAN (640 Mbps link, 36
10 Mbps TCP, 75 Mbps UDP,  and 300 Mbps native  currently). We
believe that if MD5  cannot support existing network bandwidth
using existing technology, that  situation  will not change in
the future.  We  propose an  alternative to MD5, that is 8- or
16-way block chained, rather than  1-way.  We believe that the
resulting algorithm achieves  the goals  of MD5 over MD4,  but
without the  serialization penalty that  prohibits high  speed
implementation.  It  would require further analysis  to ensure
that it provides an adequate level of security.

--bill

home help back first fref pref prev next nref lref last post