Timed efficient stream loss tolerant authentication tesla

TESLA allows all receivers to check the integrity and authenticate the source of each packet in multicast or broadcast data streams. TESLA requires no trust between receivers, uses low-cost operations Network Working Group A.

Timed efficient stream loss tolerant authentication tesla

Google Network Working Group M.

The Web's Largest Resource for

Baugher Request for Comments: Please refer to the current edition of the "Internet Official Protocol Standards" STD 1 for the standardization state and status of this protocol. Distribution of this memo is unlimited. Introduction Multicast and broadcast communications introduce some new security challenges compared to unicast communication.

Many multicast and broadcast applications need "data origin authentication" DOAor "source authentication", in order to guarantee that a received message had originated from a given source, and was not manipulated during the transmission.

In unicast communication, a pairwise security association between one sender and one receiver can provide data origin authentication using symmetric-key cryptography such as a message authentication code, MAC. When the communication is strictly pairwise, the sender and receiver agree upon a key that is known only to them.

In groups, however, a key is shared among more than two members, and this symmetric-key approach does not guarantee data origin authentication.

Timed efficient stream loss tolerant authentication tesla

When there is a group security association [RFC] instead of a pairwise security association, any of the members can alter the packet and impersonate any other member. The MAC in this case only guarantees that the packet was not manipulated by an attacker outside the group and hence not in possession of the group keyand that the packet was sent by a source within the group.

A common way to solve the problem is by use of asymmetric cryptography, such as digital signatures. This method, unfortunately, suffers from high overhead in terms of time to sign and verify and bandwidth to convey the signature in the packet.

Several schemes have been proposed to provide efficient data origin authentication in multicast and broadcast scenarios.Looking for abbreviations of TESLA?

IX Deal Friday

It is Timed Efficient Stream Loss-Tolerant Authentication. Timed Efficient Stream Loss-Tolerant Authentication listed as TESLA. TIMED (Thermosphere Ionosphere Mesosphere Energetics and Dynamics) TIMED (Thermosphere Ionosphere Mesosphere Energetics and Dynamics).

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP) (RFC , February ) Toggle navigation Datatracker Enable Javascript for full functionality.

TESLA stands for Timed Efficient Stream Loss-Tolerant Authentication (message authentication).

Timed Efficient Stream Loss-tolerant Authentication (TESLA) Parameters

TESLA is defined as Timed Efficient Stream Loss-Tolerant Authentication (message authentication) very frequently. TESLA Protocol Receiver • Store bootstrap information – interval schedule, key disclosure delay, length of key chain • Sends nonce to determine the upper bound of the sender • Buffers the packets till the key at that interval is disclosed.

The Timed Efficient Stream Loss-tolerant Authentication (TESLA) is one such scheme. This memo specifies TESLA authentication for SRTP.

TESLA - Timed Efficient Stream Loss-Tolerant Authentication

SRTP TESLA can provide data origin authentication to RTP applications that use group security associations (such as multicast RTP applications) so long as receivers abide by the TESLA security .

What does TESLA mean in Databases? This page is about the meanings of the acronym/abbreviation/shorthand TESLA in the Computing field in general and in the Databases terminology in particular.

TESLA: Timed Efficient Stream Loss-tolerant Authentication