2016 12th International Conference on Network and Service Management (CNSM) 2016
DOI: 10.1109/cnsm.2016.7818428
|View full text |Cite
|
Sign up to set email alerts
|

On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC

Abstract: The Domain Name System Security Extensions (DNSSEC) are steadily being deployed across the Internet. DNSSEC extends the DNS protocol with two vital security properties, authenticity and integrity, using digital signatures. While DNSSEC is meant to solve security issues in the DNS, it also introduces a new one: the digital signatures significantly increase DNS packet sizes, making DNSSEC an attractive vector to abuse in amplification denial-of-service attacks. By default, DNSSEC uses RSA for digital signatures.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…A 2016 study by Van Rijswijk-Deij et al [62] analyses early deployment of ECDSA. Finally, in recent work Müller et al [48] perform a case study of the feasibility of using quantum-safe cryptographic algorithms in DNSSEC.…”
Section: Related Workmentioning
confidence: 99%
“…A 2016 study by Van Rijswijk-Deij et al [62] analyses early deployment of ECDSA. Finally, in recent work Müller et al [48] perform a case study of the feasibility of using quantum-safe cryptographic algorithms in DNSSEC.…”
Section: Related Workmentioning
confidence: 99%
“…This offers excellent security properties combined with good performance in terms of signature validation speed. Indeed, a major early adopter of ECC-based DNSSEC signing (CloudFlare) [22] has chosen to use ECDSA P-256. For the longer term we recommend considering Edwards curves-based signature schemes, in particular Ed25519 as future default algorithm and Ed448 for deployments with high security requirements.…”
Section: Summary and Recommendationsmentioning
confidence: 99%
“…They nd that often insecure algorithms are deployed. A 2016 study by Van Rijswijk-Deij et al [61] analyses early deployment of ECDSA. Finally, in recent work Müller et al [21] perform a case study of the feasibility of using quantum-safe cryptographic algorithms in DNSSEC.…”
Section: Related Workmentioning
confidence: 99%
“…We look at the aspects of algorithm deployment, as identi ed by York et al [58], and extend this work by analyzing real world data. Like Van Rijswijk-Deij et al [61], we rely on data collected by the OpenINTEL DNS measurement platform [62], which now covers more than ve years (see Section 3.4). This allows us to study the adoption and deprecation of additional algorithms compared to [61].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation