next up previous
Next: Achieving Asymmetric Security Properties Up: Discussion Previous: Discussion

TESLA Security Considerations

The security of TESLA relies on the following assumptions:

As long as these assumptions are satisfied, it is computationally intractable for an attacker to forge a TESLA packet that the receivers will authenticate successfully.


next up previous
Next: Achieving Asymmetric Security Properties Up: Discussion Previous: Discussion

Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002