TESLA project page
One of the main challenges of securing multicast
communication is source authentication, or enabling receivers of multicast data to verify
that the received data originated with the claimed source and was not modified en-route.
The problem becomes more complex in common settings where other receivers of the data
are untrusted, and where lost packets are not retransmitted.
- The TESLA
Broadcast Authentication Protocol PS,
PDF,
PS.GZ,
HTML,
BIB,
with Ran Canetti, Dawn Song,
and Doug
Tygar, in RSA Cryptobytes, Summer 2002.
- Efficient and
Secure Source Authentication for Multicast PS,
PDF,
PS.GZ,
HTML,
BIB,
with Ran Canetti, Dawn Song,
and Doug Tygar, in Proceedings of Network and Distributed System Security Symposium NDSS 2001,
February 2001.
- Efficient Authentication and Signing of
Multicast Streams over Lossy Channels PS,
PDF,
PS.GZ,
HTML,
BIB,
with Ran Canetti, Dawn Song,
and Doug Tygar, in Proc. of IEEE
Security and Privacy Symposium S&P2000,
May 2000.
- TESLA: Multicast
Source Authentication Transform Introduction draft-ietf-msec-tesla-intro-03.txt,
with Ran Canetti, Bob Briscoe, Dawn Song,
and Doug Tygar, proposed IETF draft.
- TESLA: Multicast
Source Authentication Transform Specification draft-ietf-msec-tesla-spec-00.txt,
Adrian Perrig, Ran Canetti, and Bram Whillock, proposed IETF draft.
- Bram Whillock
implemented the TESLA specification. The code is available
here, use it at your own risk.
A detailed description of TESLA is in our book.
TELAS TELSA TESLA broadcast authentication protocol