next up previous
Next: Bootstrapping Receivers Up: The TESLA Broadcast Authentication Previous: Sketch of TESLA protocol

Sender Setup

 

TESLA uses self-authenticating one-way chains. The sender divides the time into uniform intervals of duration Tint. Time interval 0 will start at time T0, time interval 1 at time T1 = T0 + Tint, etc. The sender assigns one key from the one-way chain to each time interval in sequence. The one-way chain is used in the reverse order of generation, so any value of a time interval can be used to derive values of previous time intervals.

The sender determines the length N of the one-way chain K0, K1, &ldots;, KN, and this length limits the maximum transmission duration before a new one-way chain must be created.gif The sender picks a random value for KN. Using a pseudo-random function f, the sender constructs the one-way function F: F(k) = fk(0). The remainder of the chain is computed recursively using Ki = F(Ki+1). Note that this gives us Ki = FN-i(KN), so we can compute any value in the key chain from KN even if we do not have intermediate values. Each key Ki will be active in time interval i.


next up previous
Next: Bootstrapping Receivers Up: The TESLA Broadcast Authentication Previous: Sketch of TESLA protocol

Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002