With security as a central objective, SCION naturally makes extensive use of cryptography. Different SCION components require different types of crypto-graphic primitives: symmetric and asymmetric. For example, while the control plane mainly relies on asymmetric cryptography in the form of signatures to enable any entity to verify the authenticity of the signed data and achieve non-repudiation, only symmetric primitives such as message authentication codes (MACs) are sufficiently efficient for data-plane packet processing.
CITATION STYLE
Legner, M., Perrig, A., & Wyss, M. (2022). Cryptography. In Information Security and Cryptography (pp. 407–416). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-05288-0_17
Mendeley helps you to discover research relevant for your work.