OPT and DRKey

  • Adrian Perrig
  • Pawel Szalachowski
  • Raphael M. Reischuk
  • Laurent Chuat
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

This chapter presents Origin and Path Trace (OPT)—lightweight, scalable, and secure protocols for shared key setup, source authentication, and path validation. In-network source authentication and path validation are fundamental primitives for constructing higher-level security mechanisms such as DDoS mitigation, path compliance, packet attribution, or protection against flow redirection.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Adrian Perrig
    • 1
  • Pawel Szalachowski
    • 2
  • Raphael M. Reischuk
    • 3
  • Laurent Chuat
    • 4
  1. 1.Network Security Group, CAB F 85.1ETH ZürichZürichSwitzerland
  2. 2.Network Security Group, CAB F 85.2ETH ZürichZürichSwitzerland
  3. 3.Network Security Group, CAB F 83ETH ZürichZürichSwitzerland
  4. 4.Network Security Group, CAB F 86.1ETH ZürichZürichSwitzerland

Personalised recommendations