Secure Information Networks pp 176-190 | Cite as
Secure Distributed Virtual Conferencing
Chapter
Abstract
We describe a secure distributed virtual conferencing application (SDVC) that provides high quality streaming video and audio using IP multicast for efficient distribution, uses strong authentication via cryptographic means, and (optionally) provides fully encrypted communication without sacrificing the quality of the medium or the user experience. We summarize our experiences with SDVC in a recent live demonstration and conclude with a discussion of future plans.
Keywords
Advance Encryption Standard Multicast Group Stream Cipher Expander Graph Security Context
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download
to read the full chapter text
References
- [ARV95]W. Aiello, S. Rajagopalan, and R. Venkatesan. “Design of Practical and Provably Good Random Number Generators”. In Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1 - 9, January 1995.Google Scholar
- [Cen99]Berkeley Multimedia Research Center. Berkeley MPEG Tools, May 1999. http://bmrc.berkeley.edu/frame/research/mpeg/.Google Scholar
- [DEF+98]S. Deering, D. Estrin, D. Farinacci, V. Jacobson, A. Helmy, D. Meyer, and L. Wei. “Protocol Independent Multicast Version 2 Dense Mode Specification (Draft)”. Internet Engineering Task Force, November 1998.Google Scholar
- [GG81]O. Gabber and Z. Galil. “Explicit Constructions of LinearSized Superconcentrators”. Journal of Computer and System Sciences, 22 (3): 407 - 420, June 1981.MathSciNetCrossRefGoogle Scholar
- [GL89]O. Goldreich and L. A. Levin. “A Hard-Core Predicate for All One-Way Functions”. In 21st Ann. ACM Symposium on Theory of Computing, pages 25 - 32, May 1989.Google Scholar
- [glo]The Globus Project. http://www.globus.org.Google Scholar
- [HAC+98]P. Honeyman, W. A. Adamson, K. W. Coffman, J. Janakiraman, R. Jerdonek, and J. Rees. “Secure Videoconferencing”. In Proceedings of the Seventh USENIX Security Symposium, pages 123 - 130. USENIX Association, January 1998.Google Scholar
- [Lin97]J. Linn. Generic Security Service Application Program Interface, Version 2. RFC 2078, Internet Engineering Task Force, January 1997.Google Scholar
- [LM94]T. Leighton and S. Micali. Secret-key Agreement without PublicKey Cryptography. In Advances in Cryptology - CRYPTO ’93, pages 456 - 479, 1994.Google Scholar
- [Mer]Merit, Inc. Merit Network Home. Ann Arbor, MI, http://www.merit.net/.Google Scholar
- [MHP98]P. D. McDaniel, P. Honeyman, and A. Prakash. “Lightweight Secure Group Communication”. Technical Report 98-2, CITI, University of Michigan, April 1998.Google Scholar
- [Mic]Sun Microsystems. Desktop Products - Multimedia. Part number X1085A.,http : //www. sun. corn/.Google Scholar
- [Mit97]Suvo Mittra. “Iolus: A Framework for Scalable Secure Multicasting”. Computer Communication Review, 27 (4): 277 - 288, October 1997.CrossRefGoogle Scholar
- [MPH99]P. D. McDaniel, A. Prakash, and P. Honeyman. “Antigone: A Flexible Framework for Secure Group Communication”. In Proceedings of the 8th USENIX Security Symposium, August 1999.Google Scholar
- [Net96]Network Research Group, Lawrence Berkeley National Laboratory. LBNL’s Network Research Group, July 1996. http://www-nrg.ee.lbl.gov/.Google Scholar
- [oSN]National Institute of Standards and Technology (NIST). “Advanced Encryption Standard (AES) Development Effort”. http://csrc.nist.gov/encryption/aes/.Google Scholar
- [Sch96]B. Schneier. Applied Cryptography. John Wiley and Sons, Inc., second edition, 1996.Google Scholar
- [Sti95]D.R. Stinson. Cryptography: Theory and Practice. CRC Press, Inc., 1995.Google Scholar
- [TC99]D. Thaler and B. Cain. “BGP Attributes for Multicast Tree Construction ( Draft)”. Internet Engineering Task Force, February 1999.Google Scholar
- [Tho99]K. Thompson. vBNS Multicast Overview, February 1999. http://www.vbns.net/multicast/overview.html.Google Scholar
- [vBN]vBNS. www.vbns.net/.Google Scholar
- [WHA98]D. M. Wallner, E. J. Harder, and R. C. Agee. “Key Management for Multicast: Issues and Architectures ( Draft)”. Internet Engineering Task Force, September 1998.Google Scholar
- [You]Eric A. Young. SSLeay. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/.Google Scholar
Copyright information
© Springer Science+Business Media Dordrecht 1999