next up previous
Next: Initial synchronization (preliminary discussion) Up: TESLA: Timed Efficient Stream Previous: TESLA: Timed Efficient Stream

Threat Model and security guarantee

We design our schemes to be secure against a powerful adversary with the following capabilities:

The security property we guarantee is that the receiver does not accept as authentic any message Mi unless Mi was actually sent by the sender. A scheme that provides this guarantee is called a secure stream authentication scheme.

Note that the above security requirements do not include protection against message duplication. Such protection can (and should) be added separately by standard mechanisms, such as nonces or serial numbers. Schemes I-III below do have protection against message duplication. Note also that we do not address denial-of-service attacks.


next up previous
Next: Initial synchronization (preliminary discussion) Up: TESLA: Timed Efficient Stream Previous: TESLA: Timed Efficient Stream

Adrian Perrig
Sat Sep 2 17:01:14 PDT 2000