Keywords : Packet
Engineering and Technology Journal,
2010, Volume 28, Issue 24, Pages 7027-7036
In this paper the proposed method based on two encrypted algorithms (Public key, and Block cipher) at the same time, it allowed a sender to encrypt the multicast packet and forward it into the packet network on the optimal distribution tree. The packet may be replicated at the optimal locations in the network and delivered to all the receivers. The receivers are capable of decrypting the packet and forwarding the
packet in the secure network environment. The sender must encrypt packets using a shared key that all the legitimate receivers use to decrypt thepackets. The security of the system is based on the ability to control the distribution of the keys only to those legitimate receivers.