Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology – ASIACRYPT 2009
  3. Conference paper

Security Notions and Generic Constructions for Client Puzzles

  • Conference paper
  • pp 505–523
  • Cite this conference paper
Advances in Cryptology – ASIACRYPT 2009 (ASIACRYPT 2009)
Security Notions and Generic Constructions for Client Puzzles
  • Liqun Chen17,
  • Paul Morrissey18,
  • Nigel P. Smart18 &
  • …
  • Bogdan Warinschi18 

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5912))

Included in the following conference series:

  • International Conference on the Theory and Application of Cryptology and Information Security
  • 3766 Accesses

  • 35 Citations

Abstract

By a computational puzzle we mean a mildly difficult computational problem that requires resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in security. In this paper we are concerned with client puzzles: a type of puzzle used as a defense against Denial of Service (DoS) attacks. The main contribution of this paper is a formal model for the security of client puzzles.We clarify the interface that client puzzles should offer and give two security notions for puzzles. Both functionality and security are inspired by, and tailored to, the use of puzzles as a defense against DoS attacks.Our definitions fill an important gap: breaking either of the two properties immediately leads to successful DoS attacks. We illustrate this point with an attack against a previously proposed puzzle construction.We also provide a generic construction of a client puzzle which meets our security definitions.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Chapter © 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

Article 13 April 2016

A Tutorial on Security and Privacy Challenges in CPS

Chapter © 2022

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Algorithms
  • Computer Crime
  • Computational Intelligence
  • Cryptology
  • Logic gates
  • Legal Aspects of Computing

References

  1. Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Kermoytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Trans. on Info. and Syst. Sec. 4, 1–30 (2004)

    Google Scholar 

  2. Aura, T., Nikander, P., Leiwo, J.: DoS-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170–181. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Barak, B., Mahmoody–Ghidary, M.: Merkle Puzzles are Optimal. Cryptology ePrint archive, report 2008/032 (2008)

    Google Scholar 

  4. Biham, E., Goren, Y.J., Ishai, Y.: Basing Weak Public-Key Cryptoraphy on Strong One-Way Functions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 55–72. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Canetti, R., Halevi, S., Steiner, M.: Hardness Amplification of Weakly Verifiable Puzzles. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 17–33. Springer, Heidelberg (2005)

    Google Scholar 

  6. Chen, L., Mao, W.: An Auditable Metering Scheme for Web Advertisement Applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 475–485. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defence mechanisms: Classification and State–of–the–Art. Computer Networks 44, 643–666 (2004)

    Article  Google Scholar 

  8. Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Email. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)

    Google Scholar 

  9. Eddy, W.: TCP SYN Flooding Attacks and Common Mitigations. RFC 4987

    Google Scholar 

  10. Gao, Y.: Efficient Trapdoor-Based Client Puzzle System Against DoS Attacks. M.Sc Thesis, University of Wollongong, Computer Science Department (2005)

    Google Scholar 

  11. Groza, B., Petrica, D.: On Chained Cryptographic Puzzles. In: 3rd Romanian-Hungarian Joint Symp. on Applied Comput. Intel. – SACI, pp. 25–26 (2006)

    Google Scholar 

  12. Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One–Way Permutations. In: ACM Symp. on the Theory of Comp. – STOC 1989, pp. 44–61 (1989)

    Google Scholar 

  13. Jakobsson, M., Juels, A.: Proofs of Work and Bread Pudding Protocols. In: Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. IFIP Conference Proceedings, vol. 152, pp. 258–272 (1999)

    Google Scholar 

  14. Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. In: ISOC Network and Distributed System Security Symposium, pp. 151–165 (1999)

    Google Scholar 

  15. Karig, D., Lee, R.: Remote Denial of Service Attacks and Countermeasures. Princeton University Department of Electrical Engineering Technical Report CE–L2001–002 (2001)

    Google Scholar 

  16. Meadows, C.: A Formal Framework and Evaluation Method for Network Denial of Service. In: 12th Computer Security Foundations Workshop, pp. 4–13. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  17. Meadows, C.: A Cost–Based Framework for Analysis of Denial of Service in Networks. Journal of Computer Security 9, 143–164 (2001)

    Google Scholar 

  18. Merkle, R.: Secure Communications Over Insecure Channels. Communications of the ACM 21, 294–299 (1978)

    Article  Google Scholar 

  19. Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM Computer Communication Review 34, 39–53 (2004)

    Article  Google Scholar 

  20. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. Internet Draft (October 2007)

    Google Scholar 

  21. Price, G.: A General Attack Model of Hash-Based Client Puzzles. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 319–331. Springer, Heidelberg (2003)

    Google Scholar 

  22. Rivest, R.L., Shamir, A., Wagner, D.: Time-lock Puzzles and Timed-release Crypto. Massachusetts Institute of Technology Technical Report TR-684 (1996)

    Google Scholar 

  23. Rogaway, P.: Formalizing Human Ignorance. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 211–228. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  24. Schaller, P., Capkun, S., Basin, D.: BAP: Broadcast Authentication Using Cryptographic Puzzles. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 401–419. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  25. Smith, J., González–Nieto, J.M., Boyd, C.: Modelling Denial of Service Attacks on JFK with Meadows’s Cost–Based Framework. In: Proceedings of the 2006 Australasian workshop on Grid computing and e–research, vol. 54, pp. 125–134 (2006)

    Google Scholar 

  26. Specht, S., Lee, R.: Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. In: 17th International Conference on Parallel and Distributed Computing Systems, pp. 543–550 (2004)

    Google Scholar 

  27. Tritilanunt, S., Boyd, C., Foo, E., González Nieto, J.M.: Toward Non-parallelizable Client Puzzles. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 247–264. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  28. Waters, B., Juels, A., Halderman, J.A., Felten, E.W.: New Client Puzzle Outsourcing Techniques for DoS Resistance. In: 11th ACM Conference on Computer and Communication Security – CCS, pp. 246–256. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Hewlett-Packard Laboratories, Bristol, UK

    Liqun Chen

  2. Computer Science Department, University of Bristol, UK

    Paul Morrissey, Nigel P. Smart & Bogdan Warinschi

Authors
  1. Liqun Chen
    View author publications

    Search author on:PubMed Google Scholar

  2. Paul Morrissey
    View author publications

    Search author on:PubMed Google Scholar

  3. Nigel P. Smart
    View author publications

    Search author on:PubMed Google Scholar

  4. Bogdan Warinschi
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Information Technology R&D Center, Mitsubishi Electric Corporation, 247-8501, Kamakura, Kanagawa, Japan

    Mitsuru Matsui

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, L., Morrissey, P., Smart, N.P., Warinschi, B. (2009). Security Notions and Generic Constructions for Client Puzzles. In: Matsui, M. (eds) Advances in Cryptology – ASIACRYPT 2009. ASIACRYPT 2009. Lecture Notes in Computer Science, vol 5912. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10366-7_30

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-10366-7_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10365-0

  • Online ISBN: 978-3-642-10366-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Clock Cycle
  • Generic Construction
  • Function Family
  • Random Oracle Model
  • Pseudorandom Function

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

216.73.216.115

Not affiliated

Springer Nature

© 2025 Springer Nature