[e2e] Re: [Tsvwg] Really End-to-end or CRC vs everything else?

David P. Reed dpreed at reed.com
Mon Jun 11 10:00:39 PDT 2001


At 09:35 AM 6/11/01 -0400, Craig Partridge wrote:
>You just changed the problem from one of checksum (where checksum is defined
>as "a cost-effective error check") to cryptographic signature ("a check
>against adversaries").  I think that's redefining the problem :-).  It may
>turn out that the solution is to declare, OK checksums were a bad idea -- but
>I'm not there yet.

I think I am there.  It's not obvious that there is a significant 
difference in computational complexity between handling the adversary model 
and error detection that is tuned to a model of all possible kinds of 
corruption that can be introduced by computational elements.

Yes, I'd like to see faster end-to-end message hashes, but they really 
aren't inherently slow - at least I haven't seen a proof yet that shows 
that good check-functions are in a different computational complexity class 
from good message-authentication-functions.  (there's a theory thesis 
there, perhaps? though since both classes seem to be linear in message 
size, the problem seems to be one of bounding the constant factor).

In addition, it has become clear over the last few years that there is a 
rising propensity for introduction of middleboxes/services that try to do 
favors that supposedly don't "change the semantics" of the communication 
among applications.  The "radical" part of my position is that end-to-end 
protocols should be able to detect and reject these "favors".  That still 
leaves a lot of room for network optimizations - lossless compression, 
dynamic routing, congestion control, etc. all can be done without tinkering 
with the application messages.

>That list (of typical hardware and software malfunctions) is a small 
>fraction of the kinds of errors that a motivated adversary
>could cause.  And we could imagine designing checksums to be efficacious
>against such errors.

Agreed.  I stipulate that this paragraph is all true.   But as mentioned 
above, proving that the checksum will be significantly optimized by 
handling only this broad and fuzzy "small fraction" and not the more 
general "adversary-driven" class of corruptions seems to be of value only 
if the cryptographic approach is dramatically costly.  And it isn't 
anymore, since silicon and theory have both advanced over the last 25 years 
a great deal.






- David
--------------------------------------------
WWW Page: http://www.reed.com/dpr.html





More information about the end2end-interest mailing list