Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2007, Vol. 33 ›› Issue (16): 130-132. doi: 10.3969/j.issn.1000-3428.2007.16.045

• Security Technology • Previous Articles     Next Articles

Research on Source Authentication Schemes for IP Multicast

ZHOU Xian-wei, DAI Xin-yu, LIU Yun-luo   

  1. (School of Information and Engineering, University of Science and Technology Beijing, Beijing 100083)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-08-20 Published:2007-08-20

IP组播源认证方案研究

周贤伟,戴昕昱,刘蕴络   

  1. (北京科技大学信息工程学院,北京100083)

Abstract: The paper discusses the application requirements and basic design principles for the existing IP multicast source authentication schemes. Several typical authentication schemes are briefly analyzed. Qualitative analyses of these schemes show the overall performance characteristics and quantitative analyses present the overhead of these schemes. When designing practical IP multicast source authentication schemes, qualitative and quantitative analyses can help to choose the scheme which best meets the application requirements.

Key words: IP multicast, source authentication, Hash, message authentication code(MAC)

摘要:

分析了IP组播源认证方案的应用需求及设计基本原则,介绍了一些有代表性的源认证方案的基本思想并作了定性分析,从总体上把握了方案的性能特征,定量地分析了其开销情况。在设计实用的IP 组播源认证方案时,可以依据定量及定性分析的结果,挑选最能满足应用需求的方案。

关键词: IP组播, 源认证, 散列, 消息认证码

CLC Number: