2008 | OriginalPaper | Chapter
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers
Authors : Patrick P. Tsang, Sean W. Smith
Published in: Information Security Practice and Experience
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Cryptographic puzzles can be used to mitigate spam and denial-of-service (DoS) attacks, as well as to implement timed-release cryptography. However, existing crypto puzzles are impractical because: (1) solving them wastes computing resources and/or human time, (2) the time it takes to solve them can vary dramatically across computing platforms, and/or (3) applications become non-interoperable due to competition for resources when solving them.
We propose the use of
Trusted Computing
in constructing crypto puzzles. Our puzzle constructions have
none
of the drawbacks above and only require each client machine to be equipped with a small tamper-resistant
Trusted Puzzle Solver (TPS)
, which may be realized using the prevalent Trusted Platform Module (TPM) with minimal modifications.