Secure Videoconferencing

At the Center for Information Technology Integration, we are experimenting with algorithms and protocols for building secure applications. In our security testbed, we have modified VIC, an off-the-shelf videoconferencing application, to support GSS, a generic security interface. We then layered these interfaces onto a smartcard-based key distribution algorithm and a fast cipher. Because these components are accompanied by rigorous mathematical proofs of security and are accessed through narrowly-defined interfaces, we have confidence in the strength of the system's security.

[1]  Silvio Micali,et al.  Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.

[2]  Gustavus J. Simmons,et al.  The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .

[3]  John K. Ousterhout,et al.  An X11 Toolkit Based on the Tcl Language , 1991, USENIX Winter.

[4]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[5]  Silvio Micali,et al.  Secret-key agreement without public-key , 1994, CRYPTO 1994.

[6]  Ken Thompson,et al.  Password security: a case history , 1979, CACM.

[7]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[8]  Tim Howes,et al.  Lightweight Directory Access Protocol , 1995, RFC.

[9]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[10]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[11]  Zvi Galil,et al.  Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..

[12]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[13]  John Linn,et al.  Generic Security Service Application Program Interface , 1993, RFC.

[14]  Daniel Klein,et al.  Foiling the cracker: A survey of, and improvements to, password security , 1992 .

[15]  David M'Raïhi,et al.  Arithmetic co-processors for public-key cryptography: The state of the art , 1996, CARDIS.

[16]  Victor Shoup,et al.  Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.

[17]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[18]  Atul Prakash,et al.  Flexible control of downloaded executable content , 1999, TSEC.

[19]  Louis Guillou,et al.  The smart card: A standardized security device dedicated to public cryptology , 1992 .

[20]  John Linn,et al.  Generic Security Service Application Program Interface, Version 2 , 1997, RFC.

[21]  Steven McCanne,et al.  vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.

[22]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[23]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[24]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[25]  Jean-Jacques Quisquater,et al.  FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications , 1996, CARDIS.

[26]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.