Solved

Distributed Encrypted Systems?

Posted on 2004-03-31
2
227 Views
Last Modified: 2010-04-17
I need to write a system that allows a user to create a vertual network (on a scale of 2-100 users).

I need to meet the following requirements -

A: The system may not have a central point of failer (no server or arbitor), nor may systems discover the identity of systems with witch they are not directly connected.

B: System must provide a virtual addressing scheam, that allows nodes to idntify other nodes. Nodes must be routed to, via connections to known systems. Example -
System A is directly connected to System B, System B is directly connected to System C. A can identify C via its virtual address and exchange data with it via B, but it may never determine the identity of the real identity of system C (it can't determine Cs IP, MAC etc.).

C: System must be secure, and must make it impossible to detect when a virtual link is in use and when it is idel (when a connection is idle, junk messages must be sent).

I am fully capable of writting such a system, but I would like to know, if someone has alredy written one (so I can just implement my application on top of it).

Thank you for your time,
Arrummzen
0
Comment
Question by:Arrummzen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 45

Accepted Solution

by:
sunnycoder earned 250 total points
ID: 10730442
Hi Arrummzen,

> A: The system may not have a central point of failer (no server or arbitor), nor may systems
> discover the identity of systems with witch they are not directly connected.
This is more difficult than it sounds unless you configure the network statically
Main problem with this is how do network hosts discover each other ... If they broadcast their willingness to join the network, others can detect the identities ... If you use a root server, you have a central place of failure ...
If you are keen on concealing the identities, then maybe you can use a central/root server ... If it fails, a new root server can be elected by using quorum concensus or some other similar algorithm

> B: System must provide a virtual addressing scheam, that allows nodes to idntify other nodes.
> Nodes must be routed to, via connections to known systems. Example -
> System A is directly connected to System B, System B is directly connected to System C. A
> can identify C via its virtual address and exchange data with it via B, but it may never
> determine the identity of the real identity of system C (it can't determine Cs IP, MAC etc.).
Quite possible ... you can have two identities for a system

> C: System must be secure, and must make it impossible to detect when a virtual link is in
> use and when it is idel (when a connection is idle, junk messages must be sent).
easiest of all except for link arbitration ... you will have too many collisions and low throughput unless some kind of token  passing is used

I think several P2P applications such as IRC or may be even yahoo messenger run with similar architecture except that they have some root servers ... May be you can take a look at them and adapt the source code (I believe you can get source code for *nix machines, not sure though)

Sunnycoder
0
 
LVL 1

Author Comment

by:Arrummzen
ID: 10755460
Thank you. I will take a look at the systems you mentioned, I would like to avoid reinventing the wheel as much as possible.

Thank you for your time,
Arrummzen
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
allswap challenge 6 134
Modify a small python script 19 121
some keys in my laptop is not working. any suggestion 6 48
Why is initMap returning "not a function" error. 3 65
A short article about a problem I had getting the GPS LocationListener working.
In this post we will learn different types of Android Layout and some basics of an Android App.
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question