Skip to main content

Secure Communication: A New Application for Active Networks

  • Conference paper
Networking — ICN 2001 (ICN 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2094))

Included in the following conference series:

Abstract

SplitPath is a new application for the easy, well-known and provably secure one-time pad encryption scheme. Two problems hinder the one-time pad scheme from being applied in the area of secure data communication: the random generation and the distribution of this random data. SplitPath exploits the flexibility of code mobility in active networks to address these problems. Especially the random generation is studied in more detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Calvert, S. Bhattacharjee, E. Zegura, and J. Sterbenz. Directions in active networks. IEEE Communications, 36(10), October 1998.

    Google Scholar 

  2. Tamas Elteto and Sandor Molnar. On the distribution of round-trip delays in TCP/IP Networks. In Proceedings of the 24th Conference on Local Computer Networks LCN’99, pages p.172–181. IEEE Computer Society, October 1999.

    Google Scholar 

  3. M. Günter, M. Brogle, and T. Braun. Secure communication with active networks. Technical Report IAM-00-007, IAM, 2000.

    Google Scholar 

  4. M. E. Hellman. An extension to the shannon theory approach to cryptography. IEEE Transactions on Information Theory, IT-23(3):p. 289–294, May 1977.

    Article  MATH  MathSciNet  Google Scholar 

  5. D. E. Knuth. The art of computer programming,volume 2 Seminumerical Algorithms. Addison-Wesley, 2 edition, 1981.

    Google Scholar 

  6. B. Schneier. Applied Cryptography. John Wiley and Son, 1996.

    Google Scholar 

  7. D. L. Tennenhouse, J. M. Smith, W. D. Sincoskie, D. J. Wetherall, and G. J. Minden. A survey of active networkresearch. IEEE Communications Magazine, 35(1):80–86, January 1997.

    Article  Google Scholar 

  8. D. Wetherall, J. Guttag, and D. L. Tennenhouse. ANTS: A toolkit for building and dynamically deploying networkproto cols. In IEEE OPENARCH’ 98, April 1998. San Francisco.

    Google Scholar 

  9. Reinhard Wobst. Abenteuer Kryptologie. Addison-Wesley, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Günter, M., Brogle, M., Braun, T. (2001). Secure Communication: A New Application for Active Networks. In: Networking — ICN 2001. ICN 2001. Lecture Notes in Computer Science, vol 2094. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47734-9_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-47734-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42303-4

  • Online ISBN: 978-3-540-47734-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics