Attacks on BGP at a session level (e.g. breaking MD5 to sneak in bogus
packets) are not really the main worry when BGP systemically assumes that
speakers are trusted. There are various ways you can subvert routing,
including some quite ingenious, stealthy re-routing techniques described in
the last few years at blackhat conferences.