Secure Distributed Virtual Conferencing

  • W. A. Adamson
  • C. J. Antonelli
  • K. W. Coffman
  • P. McDaniel
  • J. Rees
Chapter
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 23)

Abstract

We describe a secure distributed virtual conferencing appli­cation (SDVC) that provides high quality streaming video and audio using IP multicast for efficient distribution, uses strong authentication via cryptographic means, and (option­ally) provides fully encrypted communication without sac­rificing the quality of the medium or the user experience. We summarize our experiences with SDVC in a recent live demonstration and conclude with a discussion of future plans.

Keywords

Advance Encryption Standard Multicast Group Stream Cipher Expander Graph Security Context 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [ARV95]
    W. Aiello, S. Rajagopalan, and R. Venkatesan. “Design of Practical and Provably Good Random Number Generators”. In Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1 - 9, January 1995.Google Scholar
  2. [Cen99]
    Berkeley Multimedia Research Center. Berkeley MPEG Tools, May 1999. http://bmrc.berkeley.edu/frame/research/mpeg/.Google Scholar
  3. [DEF+98]
    S. Deering, D. Estrin, D. Farinacci, V. Jacobson, A. Helmy, D. Meyer, and L. Wei. “Protocol Independent Multicast Version 2 Dense Mode Specification (Draft)”. Internet Engineering Task Force, November 1998.Google Scholar
  4. [GG81]
    O. Gabber and Z. Galil. “Explicit Constructions of LinearSized Superconcentrators”. Journal of Computer and System Sciences, 22 (3): 407 - 420, June 1981.MathSciNetCrossRefGoogle Scholar
  5. [GL89]
    O. Goldreich and L. A. Levin. “A Hard-Core Predicate for All One-Way Functions”. In 21st Ann. ACM Symposium on Theory of Computing, pages 25 - 32, May 1989.Google Scholar
  6. [glo]
    The Globus Project. http://www.globus.org.Google Scholar
  7. [HAC+98]
    P. Honeyman, W. A. Adamson, K. W. Coffman, J. Janakiraman, R. Jerdonek, and J. Rees. “Secure Videoconferencing”. In Proceedings of the Seventh USENIX Security Symposium, pages 123 - 130. USENIX Association, January 1998.Google Scholar
  8. [Lin97]
    J. Linn. Generic Security Service Application Program Interface, Version 2. RFC 2078, Internet Engineering Task Force, January 1997.Google Scholar
  9. [LM94]
    T. Leighton and S. Micali. Secret-key Agreement without PublicKey Cryptography. In Advances in Cryptology - CRYPTO ’93, pages 456 - 479, 1994.Google Scholar
  10. [Mer]
    Merit, Inc. Merit Network Home. Ann Arbor, MI, http://www.merit.net/.Google Scholar
  11. [MHP98]
    P. D. McDaniel, P. Honeyman, and A. Prakash. “Lightweight Secure Group Communication”. Technical Report 98-2, CITI, University of Michigan, April 1998.Google Scholar
  12. [Mic]
    Sun Microsystems. Desktop Products - Multimedia. Part number X1085A.,http : //www. sun. corn/.Google Scholar
  13. [Mit97]
    Suvo Mittra. “Iolus: A Framework for Scalable Secure Multicasting”. Computer Communication Review, 27 (4): 277 - 288, October 1997.CrossRefGoogle Scholar
  14. [MPH99]
    P. D. McDaniel, A. Prakash, and P. Honeyman. “Antigone: A Flexible Framework for Secure Group Communication”. In Proceedings of the 8th USENIX Security Symposium, August 1999.Google Scholar
  15. [Net96]
    Network Research Group, Lawrence Berkeley National Laboratory. LBNL’s Network Research Group, July 1996. http://www-nrg.ee.lbl.gov/.Google Scholar
  16. [oSN]
    National Institute of Standards and Technology (NIST). “Advanced Encryption Standard (AES) Development Effort”. http://csrc.nist.gov/encryption/aes/.Google Scholar
  17. [Sch96]
    B. Schneier. Applied Cryptography. John Wiley and Sons, Inc., second edition, 1996.Google Scholar
  18. [Sti95]
    D.R. Stinson. Cryptography: Theory and Practice. CRC Press, Inc., 1995.Google Scholar
  19. [TC99]
    D. Thaler and B. Cain. “BGP Attributes for Multicast Tree Construction ( Draft)”. Internet Engineering Task Force, February 1999.Google Scholar
  20. [Tho99]
    K. Thompson. vBNS Multicast Overview, February 1999. http://www.vbns.net/multicast/overview.html.Google Scholar
  21. [vBN]
    vBNS. www.vbns.net/.Google Scholar
  22. [WHA98]
    D. M. Wallner, E. J. Harder, and R. C. Agee. “Key Management for Multicast: Issues and Architectures ( Draft)”. Internet Engineering Task Force, September 1998.Google Scholar
  23. [You]
    Eric A. Young. SSLeay. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSL/.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • W. A. Adamson
    • 1
  • C. J. Antonelli
    • 1
  • K. W. Coffman
    • 1
  • P. McDaniel
    • 1
  • J. Rees
    • 1
  1. 1.Center for Information Technology IntegrationThe University of MichiganAnn ArborUSA

Personalised recommendations