INTRODUCTIONMulticast communication as defined in [1] is an efficient means of distributing data to a group of participants. In contrast to unicast communications, multicast routing permits a single IP datagram to be routed to multiple hosts with minimal redundant transmission within a network. Membership in a multicast group is often highly dynamic, with receivers entering and leaving the multicast session without the permission or explicit knowledge of other hosts. The inherent cost and resource benefits of multicast routing and data delivery are clear; however, the group-oriented communication paradigm presents new and unique technical challenges beyond traditional network security approaches.Potential security threats to multicast communications are similar to those encountered in unicast transmissions. Threats include the unauthorized creation, alteration, destruction, and illegitimate use of data [5]. In the case of multicast traffic, because of the inherent broad scope of a multicast session, the potential for attacks may be greater than for unicast traffic. It is desirable to secure these vulnerabilities while maintaining some of the efficiency and performance benefits of multicast service.The field of multicast networking and related security issues is a broad technical subject. Within the space limitations allowed, we discuss some relevant technical issues and performance tradeoffs to consider when applying security and key management techniques in support of multicast networking. First, we provide a brief background of multicast technology and potential network security threats and issues. Second, we explore the application of existing and proposed security techniques for multicast networking, including key distribution, dynamic key management, and reliability issues. Throughout this paper we hope to summarize performance and security policy considerations within the context and impact of overall architectural performance.