Skip to main content

A Simple Approach to Data Source Authentication for Multicast Security
draft-sharma-simple-multicast-source-auth-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Atul Sharma
Last updated 2004-05-11
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Data source authentication is an important requirement to provide multicast security. Data source authentication assures that the member claiming to send the data is the actual sender. An imposter member should not be able to claim to be the sender of the data. This document proposes a scheme by which data source authentication can be acheived. This approach does not use digital signatures or assume any time synchronization between the sender and the receivers. Instead of directly authenticating a multicast communication, it is split into a 1-to-1 authenticated unicast to GCKS followed by an authenticated multicast by GCKS. Message Authentication Codes (MACs) are used instead of digital signatures in both the authenticated unicast and the authenticated multicast.

Authors

Atul Sharma

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)