The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

Roland M. van Rijswijk, Kasper Hageman, Anna Sperotto, Aiko Pras

  • 2 Citations

Abstract

The Domain Name System is a core Internet infrastructure that translates names to machine-readable information, such as IP addresses. Security flaws in DNS led to a major overhaul, with the introduction of the DNS Security Extensions. DNSSEC adds integrity and authenticity to the DNS using digital signatures. DNSSEC, however, has its own concerns. It suffers from availability problems due to packet fragmentation and is a potent source of distributed denial-of-service attacks. In earlier work we argued that many issues with DNSSEC stem from the choice of RSA as default signature algorithm. A switch to alternatives based on elliptic curve cryptography (ECC) can resolve these issues. Yet switching to ECC introduces a new problem: ECC signature validation is much slower than RSA validation. Thus, switching DNSSEC to ECC imposes a significant additional burden on DNS resolvers, pushing load toward the edges of the network. Therefore, in this paper we study the question: will switching DNSSEC to ECC lead to problems for DNS resolvers, or can they handle the extra load? To answer this question, we developed a model that accurately predicts how many signature validations DNS resolvers have to perform. This allows us to calculate the additional CPU load ECC imposes on a resolver. Using real-world measurements from four DNS resolvers and with two open source DNS implementations, we evaluate future scenarios where DNSSEC is universally deployed. Our results conclusively show that switching DNSSEC to ECC signature schemes does not impose an insurmountable load on DNS resolvers, even in worst-case scenarios.
Original languageUndefined
Pages (from-to)1-13
Number of pages13
JournalIEEE/ACM transactions on networking
Volumeonline pre-publication
DOIs
StatePublished - 2017

Fingerprint

Cryptography
Electronic document identification systems
Program processors
Switches
Availability
Internet
Defects
Denial-of-service attack

Keywords

  • IR-104118
  • EWI-27654

Cite this

van Rijswijk, Roland M.; Hageman, Kasper; Sperotto, Anna; Pras, Aiko / The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation.

In: IEEE/ACM transactions on networking, Vol. online pre-publication, 2017, p. 1-13.

Research output: Scientific - peer-reviewArticle

@article{05af9ba1bd834a05a2865d3456b5eb61,
title = "The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation",
abstract = "The Domain Name System is a core Internet infrastructure that translates names to machine-readable information, such as IP addresses. Security flaws in DNS led to a major overhaul, with the introduction of the DNS Security Extensions. DNSSEC adds integrity and authenticity to the DNS using digital signatures. DNSSEC, however, has its own concerns. It suffers from availability problems due to packet fragmentation and is a potent source of distributed denial-of-service attacks. In earlier work we argued that many issues with DNSSEC stem from the choice of RSA as default signature algorithm. A switch to alternatives based on elliptic curve cryptography (ECC) can resolve these issues. Yet switching to ECC introduces a new problem: ECC signature validation is much slower than RSA validation. Thus, switching DNSSEC to ECC imposes a significant additional burden on DNS resolvers, pushing load toward the edges of the network. Therefore, in this paper we study the question: will switching DNSSEC to ECC lead to problems for DNS resolvers, or can they handle the extra load? To answer this question, we developed a model that accurately predicts how many signature validations DNS resolvers have to perform. This allows us to calculate the additional CPU load ECC imposes on a resolver. Using real-world measurements from four DNS resolvers and with two open source DNS implementations, we evaluate future scenarios where DNSSEC is universally deployed. Our results conclusively show that switching DNSSEC to ECC signature schemes does not impose an insurmountable load on DNS resolvers, even in worst-case scenarios.",
keywords = "IR-104118, EWI-27654",
author = "{van Rijswijk}, {Roland M.} and Kasper Hageman and Anna Sperotto and Aiko Pras",
year = "2017",
doi = "10.1109/TNET.2016.2605767",
volume = "online pre-publication",
pages = "1--13",
journal = "IEEE/ACM transactions on networking",
issn = "1063-6692",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. / van Rijswijk, Roland M.; Hageman, Kasper; Sperotto, Anna; Pras, Aiko.

In: IEEE/ACM transactions on networking, Vol. online pre-publication, 2017, p. 1-13.

Research output: Scientific - peer-reviewArticle

TY - JOUR

T1 - The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation

AU - van Rijswijk,Roland M.

AU - Hageman,Kasper

AU - Sperotto,Anna

AU - Pras,Aiko

PY - 2017

Y1 - 2017

N2 - The Domain Name System is a core Internet infrastructure that translates names to machine-readable information, such as IP addresses. Security flaws in DNS led to a major overhaul, with the introduction of the DNS Security Extensions. DNSSEC adds integrity and authenticity to the DNS using digital signatures. DNSSEC, however, has its own concerns. It suffers from availability problems due to packet fragmentation and is a potent source of distributed denial-of-service attacks. In earlier work we argued that many issues with DNSSEC stem from the choice of RSA as default signature algorithm. A switch to alternatives based on elliptic curve cryptography (ECC) can resolve these issues. Yet switching to ECC introduces a new problem: ECC signature validation is much slower than RSA validation. Thus, switching DNSSEC to ECC imposes a significant additional burden on DNS resolvers, pushing load toward the edges of the network. Therefore, in this paper we study the question: will switching DNSSEC to ECC lead to problems for DNS resolvers, or can they handle the extra load? To answer this question, we developed a model that accurately predicts how many signature validations DNS resolvers have to perform. This allows us to calculate the additional CPU load ECC imposes on a resolver. Using real-world measurements from four DNS resolvers and with two open source DNS implementations, we evaluate future scenarios where DNSSEC is universally deployed. Our results conclusively show that switching DNSSEC to ECC signature schemes does not impose an insurmountable load on DNS resolvers, even in worst-case scenarios.

AB - The Domain Name System is a core Internet infrastructure that translates names to machine-readable information, such as IP addresses. Security flaws in DNS led to a major overhaul, with the introduction of the DNS Security Extensions. DNSSEC adds integrity and authenticity to the DNS using digital signatures. DNSSEC, however, has its own concerns. It suffers from availability problems due to packet fragmentation and is a potent source of distributed denial-of-service attacks. In earlier work we argued that many issues with DNSSEC stem from the choice of RSA as default signature algorithm. A switch to alternatives based on elliptic curve cryptography (ECC) can resolve these issues. Yet switching to ECC introduces a new problem: ECC signature validation is much slower than RSA validation. Thus, switching DNSSEC to ECC imposes a significant additional burden on DNS resolvers, pushing load toward the edges of the network. Therefore, in this paper we study the question: will switching DNSSEC to ECC lead to problems for DNS resolvers, or can they handle the extra load? To answer this question, we developed a model that accurately predicts how many signature validations DNS resolvers have to perform. This allows us to calculate the additional CPU load ECC imposes on a resolver. Using real-world measurements from four DNS resolvers and with two open source DNS implementations, we evaluate future scenarios where DNSSEC is universally deployed. Our results conclusively show that switching DNSSEC to ECC signature schemes does not impose an insurmountable load on DNS resolvers, even in worst-case scenarios.

KW - IR-104118

KW - EWI-27654

U2 - 10.1109/TNET.2016.2605767

DO - 10.1109/TNET.2016.2605767

M3 - Article

VL - online pre-publication

SP - 1

EP - 13

JO - IEEE/ACM transactions on networking

T2 - IEEE/ACM transactions on networking

JF - IEEE/ACM transactions on networking

SN - 1063-6692

ER -