Abstract
With security as a central objective, SCION naturally makes extensive use of cryptography. Different SCION components require different types of crypto-graphic primitives: symmetric and asymmetric. For example, while the control plane mainly relies on asymmetric cryptography in the form of signatures to enable any entity to verify the authenticity of the signed data and achieve non-repudiation, only symmetric primitives such as message authentication codes (MACs) are sufficiently efficient for data-plane packet processing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Legner, M., Perrig, A., Wyss, M. (2022). Cryptography. In: The Complete Guide to SCION. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-031-05288-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-05288-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05287-3
Online ISBN: 978-3-031-05288-0
eBook Packages: Computer ScienceComputer Science (R0)