Each key of the key chain is used in one time interval. However many messages are sent in each interval, the key which corresponds to that interval is used to compute the MAC of all those messages. This allows the sender to send packets at any rate and to adapt the sending rate dynamically. The key remains secret for d-1 future intervals. Packets sent in interval can hence disclose key . As soon as the receivers receive that key, they can verify the authenticity of the packets sent in interval .
The construction of packet sent in interval is: .
Mj MACKiMj Kimd
Figure 1 shows the key chain construction and the MAC key derivation. If the disclosure delay is 2 intervals, the packet sent in interval discloses key . From this key, the receiver can also recover and verify the MAC of , in case is lost.
Pj Pjp1 Pjp2 Pjp3 Pjp4 Pjp5 Pjp6
Kim1 Ki Kip1 Kip2 Kpim1 Kpi Kpip1 Kpip2
FKi FKip1 FKip2 FKip3 FpKim1 FpKi FpKip1 FpKip2 FpKip3
Iim1 Ii Iip1 Iip2
Figure 1: TESLA key chain and the derived MAC keys