Abstract
Security functions are of critical importance for the acceptance of Active Networks in practice: network nodes must be protected from malicious code, and they should account for the cost of executing code; this also helps to prevent denial-of-service attacks. For the payment function code packets must carry some form of light-weight electronic cash. Cryptographic schemes can be used to solve both the security and the payment/resource management problem. In this paper we propose to combine cryptographic algorithms in order to solve both problems in an integrated way. Our scheme is secure, light-weight and efficient: It saves space in the packet headers, and the security is higher than that of separate algorithms for authentication and cost accounting.
Supported by the Deutsche Forschungsgemeinschaft (DFG) grant KR 1521/3-1.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35522-1_37
Chapter PDF
Similar content being viewed by others
References
Anderson, R.,Biham, E., “Tiger: A Fast New Hash Function”, Fast Software Encryption 3, LNCS 1039, 1996, pp. 89–98.
Anderson, R., Manifavas, H., Sutherland, C., “A practical electronic cash system”, 1995.
Bellare, M., Canetti, R., Krawczyk, H, “Keying hash functions for message authentication”, Advances in Cryptology-Crypto 96 Proceedings, Springer, 1996.
Banchs, A., Effelsberg, W., Tschudin, C., Turau, V.: “Active Multicasting of Multimedia Streams”, Proc. IEEE Local Computer Networks Conference LCN’98, Lowell, MA, October 1998, pp. 150–159
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M., “Systematic Design of a Family of Two-Party Athentification Protocols”, CRYPTO’91, Springer LNCS, 1992, pp. 44–61.
Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M., “The KryptoKnight family of lightweight protocols for authentication and key distribution”, IEEE/ACM Trans. Networking 3, 1, Feb. 1995, pp. 31–41.
Dobbertin, H., Bosselaers, A., Preneel, B., “RIPEMD-160, a strengthened version of RIPEMD”, Proc. Fast Software Encryption (ed. D. Golimann), LNCS 1039, Springer, 1996, pp. 71–82.
NIST, “Secure Hash Standard”, Washington D.C., April 1995.
Haller, N., “The S/KEY One—Time Password System”, Proc. of the ISOC Symposium on Network and Distributed System Security, San Diego, CA, February 1994.
Hauser, R., Steiner, M., Waidner, M., “Micro-Payments based on iKP”, December 17, 1995.
IBM] IBM Applied Computer Science, KryptoKnight http://www.zurich.ibm.com /Technology/Security/extern/kryptoknight/
Lamport, L., “Password Authentication with Insecure Communication”, Communications of the ACM 24 (11), November 1981.
Maurer, U., Massey, J., “Cascade ciphers: the importance of being first” Journal of Cryptology. Vol. 6. Nr. 1., 1993, pp 89–105.
Molva, R., Tsudik, G., Van Herrweghen, E., Zati, S., “KryptoKnight Authentification and Key Distribution System”, Europeam Symposium on Research in Computer Security (ESORICS’92), Toulouse, 1992.
OPIE] One-time Password in everything, US Naval Research Laboratory, ftp://ftp.nrl.navy.mil/pub/security/opie
Pedersen, T., “Electronic payments of small amounts”, Technical Report DAIMI PB-495, Aarhus University, Computer Science Department, August 1995.
RiSh96] Rivest, R., Shamir, A., “Payword and Micromint”, Security Protocols, Springer LNCS 1189, 1997, pp. 1–18. ht tp://theory.lcs. mit. edu/ -rivest/RivestShamir-mpay.ps
Tsch97] Tschudin, C., “Funny Money Arbitrage for Mobile Code”, Dartmouth Workshop on Transportable Agents, Extended Abstract, August 1997. http: //www.icsi.berkeley.edu/-tschudin/dart97.txt
Wetherall, D., Guttag, J., Tennenhouse, D., “ANTS: A Toolkit for Building and Dynamically Developing Network Protocols”, Proc. OpenArch 98, San Francisco, April 1998, pp 117–129. http://www.tns.lcs.mit.edu/publications/openarch98.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Weis, R., Effelsberg, W., Lucks, S. (2000). Combining Authentication and Lightweight Payment for Active Networks. In: van As, H.R. (eds) Telecommunication Network Intelligence. SMARTNET 2000. IFIP — The International Federation for Information Processing, vol 50. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35522-1_26
Download citation
DOI: https://doi.org/10.1007/978-0-387-35522-1_26
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6693-6
Online ISBN: 978-0-387-35522-1
eBook Packages: Springer Book Archive