next up previous
Next: Receiver Tasks Up: An Overview of TESLA Previous: Bootstrapping a new Receiver

Sending Authenticated Packets

Each key of the key chain is used in one time interval. However many messages are sent in each interval, the key which corresponds to that interval is used to compute the MAC of all those messages. This allows the sender to send packets at any rate and to adapt the sending rate dynamically. The key remains secret for d-1 future intervals. Packets sent in interval Ij can hence disclose key Kj-d. As soon as the receivers receive that key, they can verify the authenticity of the packets sent in interval Ij-d.

The construction of packet Pj sent in interval Ii is: {Mj |\ MAC(K'i,Mj) | Ki-d}.

MjMj MACKiMjMAC(K'i,Mj) KimdKi-d

Figure 1 shows the key chain construction and the MAC key derivation. If the disclosure delay is 2 intervals, the packet Pj+4 sent in interval Ii+2 discloses key Ki. From this key, the receiver can also recover Ki-1 and verify the MAC of Pj, in case Pj+3 is lost.

PjPj Pjp1Pj+1 Pjp2Pj+2 Pjp3Pj+3 Pjp4Pj+4 Pjp5Pj+5 Pjp6Pj+6

Kim1Ki-1 KiKi Kip1Ki+1 Kip2Ki+2 Kpim1K'i-1 KpiK'i Kpip1K'i+1 Kpip2K'i+2

FKiF(Ki) FKip1F(Ki+1) FKip2F(Ki+2) FKip3F(Ki+3) FpKim1F'(Ki-1) FpKiF'(Ki) FpKip1F'(Ki+1) FpKip2F'(Ki+2) FpKip3F'(Ki+3)

Iim1Ii-1 IiIi Iip1Ii+1 Iip2Ii+2

 


Figure 1: TESLA key chain and the derived MAC keys 


next up previous
Next: Receiver Tasks Up: An Overview of TESLA Previous: Bootstrapping a new Receiver

Adrian Perrig
Sun Nov 5 19:29:44 PST 2000