In this section, we describe five schemes for stream authentication. Each scheme builds up on the previous one and improves it to solve its shortcomings. Finally, scheme V, which we call TESLA(short for Timed Efficient Stream Loss-tolerant Authentication), satisfies all the properties we listed in the introduction. The cryptographic primitives used in this section are reviewed in Appendix A, which also contains a sketch of a security analysis for our scheme.
We use the following notation: denotes the concatenation of and , stands for sender, and stands for receiver. A stream is divided into chunks (which we also call messages), . Each message is sent in a packet , along with additional authentication information.