In section 3 we have established the necessary requirements for secure multicast. In this section we present a set of building blocks that we use to realize any combination of security requirements. The blocks we use are reliable multicast, cryptographic algorithms, group key management and a trusted server.