Cryptography

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With security as a central objective, SCION naturally makes extensive use of cryptography. Different SCION components require different types of crypto-graphic primitives: symmetric and asymmetric. For example, while the control plane mainly relies on asymmetric cryptography in the form of signatures to enable any entity to verify the authenticity of the signed data and achieve non-repudiation, only symmetric primitives such as message authentication codes (MACs) are sufficiently efficient for data-plane packet processing.

Cite

CITATION STYLE

APA

Legner, M., Perrig, A., & Wyss, M. (2022). Cryptography. In Information Security and Cryptography (pp. 407–416). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-05288-0_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free