next up previous
Next: Sender Setup Up: The TESLA Broadcast Authentication Previous: The TESLA Broadcast Authentication

Sketch of TESLA protocol

We first outline the main ideas behind TESLA. Broadcast authentication requires a source of asymmetry, such that the receivers can only verify the authentication information, but not generate valid authentication information. TESLA uses time for asymmetry. We assume that receivers are all loosely time synchronized with the sender -- up to some time synchronization error Δ, all parties agree on the current time. Here is a sketch of the basic approach:

One-way chains have the property that if intermediate values of the one-way chain are lost, they can be recomputed using later values. So, even if some disclosed keys are lost, a receiver can recover the key chain and check the correctness of packets.

The sender distributes a stream of messages {Mi}, and the sender sends each message Mi in a network packet Pi along with authentication information. The broadcast channel may be lossy, but the sender does not retransmit lost packets. Despite packet loss, each receiver needs to authenticate all the messages it receives.

We now describe the stages of the basic TESLA protocol in this order: sender setup, receiver bootstrap, sender transmission of authenticated broadcast messages, and receiver authentication of broadcast messages.


next up previous
Next: Sender Setup Up: The TESLA Broadcast Authentication Previous: The TESLA Broadcast Authentication

Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002