Next: Session Announcement Protocol
Up: Key Distribution
Previous: SKIP and Photuris
As described in Chapter Three, CBT sets up hard state in the
routers that are part of the delivery tree. Since a lot of work goes
into establishing this tree, it is possible to complement the tree
construction with security services, such as authentication. In
particular, the tree lends itself to scalable key distribution, since
the tree can be seen as a hierarchy of routers, with the core at the
top of the hierarchy. Key distribution can then be performed by
sending the key from the core on demand to the authenticated routers,
using encrypted exchanges.
Jon CROWCROFT
1998-12-03