next up previous contents
Next: Session Announcement Protocol Up: Key Distribution Previous: SKIP and Photuris

Core Based Trees

As described in Chapter Three, CBT sets up hard state in the routers that are part of the delivery tree. Since a lot of work goes into establishing this tree, it is possible to complement the tree construction with security services, such as authentication. In particular, the tree lends itself to scalable key distribution, since the tree can be seen as a hierarchy of routers, with the core at the top of the hierarchy. Key distribution can then be performed by sending the key from the core on demand to the authenticated routers, using encrypted exchanges.



Jon CROWCROFT
1998-12-03