Cryptography Asked by AlexAndHisScripts on October 24, 2021
We’re building an ingame GPS system where only 5 lines of code are executed a second. We’re starting to face problems with people spoofing the satellites we use to triangulate. Is it feasible to filter out these messages with such low computing power, and if so, how?
The first step in verifying a signature is to hash the message, which takes a few thousand x86 instructions. Your language doesn't seem to support the logical operations that are common in modern hash functions - implementing those with arithmetic operations will cost you some overhead. So you're talking about hours before you even get to the public key portion of the signature. And you can't use a weak hash function, because your attackers aren't limited to such an under-powered platform to produce their forgeries.
I question if in-game cryptography is the best solution here. Since this is all in a managed environment, it seems like you could simply disallow spoofing of the sender property of these messages.
Answered by bmm6o on October 24, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP