Provably Secure Videoconferencing

At the Center for Information Technology Integration, we are experimenting with algorithms and protocols for building secure applications. In our security testbed, we have modified VIC, an off-the-shelf videoconferencing application, to support GSS API, a generic security interface. We then layered these interfaces onto a smartcard-based key distribution algorithm and a fast cipher. These components are accompanied by rigorous mathematical proofs of security, and are accessed through narrowly-defined interfaces, which lends confidence in the strength of the security of the system as a whole.

[1]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[2]  John K. Ousterhout,et al.  An X11 Toolkit Based on the Tcl Language , 1991, USENIX Winter.

[3]  Silvio Micali,et al.  Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.

[4]  John Linn,et al.  Generic Security Service Application Program Interface , 1993, RFC.

[5]  Zvi Galil,et al.  Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..

[6]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[7]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[8]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[9]  Steven McCanne,et al.  vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.

[10]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[11]  Gustavus J. Simmons,et al.  The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .

[12]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[13]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[14]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[15]  David M'Raïhi,et al.  Arithmetic co-processors for public-key cryptography: The state of the art , 1996, CARDIS.

[16]  Jean-Jacques Quisquater,et al.  FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications , 1996, CARDIS.

[17]  Victor Shoup,et al.  Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.

[18]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[19]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[20]  Tim Howes,et al.  Lightweight Directory Access Protocol , 1995, RFC.

[21]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[22]  Atul Prakash,et al.  Flexible control of downloaded executable content , 1999, TSEC.

[23]  John Linn,et al.  Generic Security Service Application Program Interface, Version 2 , 1997, RFC.