Advertisement

A secure, accountable, and collaborative whiteboard

  • Werner Geyer
  • Rüdiger Weis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1483)

Abstract

This paper addresses the design issues and the security concept of the digital lecture board which is an enhanced whiteboard tailored to the specific needs of collaborative types of work, for instance, in computer-based distance education. The development of the digital lecture board emerged from our experiences with synchronous, computer-based distance education in the TeleTeaching projects of the University of Mannheim. For almost two years, we have been using video conferencing tools for transmitting lectures and seminars. These tools prove to be far from optimal for this purpose since they do not take into account the specific requirements of teaching. Security issues such as authentication, secure key exchange, and fast symmetric encryption are almost completely neglected, even though security is extremely important to allow for confidential, private sessions, and billing.

Keywords

Block Cipher Video Conferencing Brute Force Attack Security Concept Collaborative Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [AnBi96]
    Anderson, R., Biham, E., ”Two Practical and Provable Secure Blockciphers: BEAR and LION”, Proc. Fast Software Encryption (ed. D. Gollmann), LNCS 1039, Springer, 1996.Google Scholar
  2. [BaOt96]
    Bacher, C., Ottmann, T., ”Tools and Services for Authoring on the Fly”, Proc. ED-MEDIA'96, Boston 1996.Google Scholar
  3. [Blea96]
    Blaze, M., Diffie, W., Rivest, R., Schneier, B., Shimomura, T., Thompson, E., Wiener, M., ”Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security”, a report by an ad hoc group of cryptographers and computer scientists, January 1996.Google Scholar
  4. [Ecea97]
    Eckert, A., Geyer, W., Effelsberg, W., ”A Distance Learning System for Higher Education Based on Telecommunications and Multimedia — A Compound Organizational, Pedagogical, and Technical Approach”, Proc. ED-MEDIA'97, Calgary, June 1997.Google Scholar
  5. [GeEf98]
    Geyer, W., Effelsberg, W., ”The Digital Lecture Board — A Teaching and Learning Tool for Remote Instruction in Higher Education”, accepted at ED-MEDIA'98, Freiburg, Germany, June 1998.Google Scholar
  6. [Geea97]
    Geyer, W., Eckert, A., Effelsberg, W.,”Multimedia Technologie zur Un-terstützung der Lehre an Hochschulen” (in German). To appear in: Multimediales Lernen in der beruflichen Bildung, Verlag BW, Nürnberg 1997.Google Scholar
  7. [HiGe97]
    Hilt, V., Geyer, W., ”A Model for Collaborative Services in Distributed Learning Environments”, Proc. of IDMS'97, Darmstadt, LNCS 1309, 1997, pp. 364–375.Google Scholar
  8. [Hiea96]
    Hinsch, E., Jaegemann, A., Wang, L., ”The Secure Conferencing User Agent — A Tool to Provide Secure Conferencing with MBONE Multimedia Conferencing Applications”. Proc. IDMS'96, Berlin, LNCS 1045, 1996, pp. 131–142.Google Scholar
  9. [Holf97]
    Holfelder, W., ”Interactive Remote Recording and Playback of Multicast Videoconferences”, Proc. IDMS'97, Darmstadt, LNCS 1309, 1997.Google Scholar
  10. [KiRo96]
    Kilian, J., Rogaway, P., ”How to protect DES against exhaustive key search”, Proc. Advances in Cryptology-Crypto'96, Berlin, Springer, 1996.Google Scholar
  11. [Koch98]
    Koch, Werner, ”GPG — The free PGP Replacement”, 1998. http://www.d.shuttle.de/isil/gnupg.htmlGoogle Scholar
  12. [Lai92]
    X. Lai, ”On the Design and Security of Blockciphers”, ETH Series in Information Processing, v. 1, Hartmut-Gorre-Verlag, Konstanz, 1992.Google Scholar
  13. [Lamp81]
    Lamport, L., ”Password Authentication with Insecure Communication”, Communications of the ACM 24(11), November 1981.Google Scholar
  14. [LuRa88]
    Luby, M., Rackoff, C., ”How to construct pseudorandom permutations from pseudo random functions”, SIAM J. Computing, V17, N2, 1988.Google Scholar
  15. [Luck96a]
    Lucks, S., ”Faster Luby-Rackoff ciphers”, Proc. Fast Software Encryption (ed. D. Gollmann), LNCS 1039, Springer, 1996.Google Scholar
  16. [Luck96b]
    Lucks, S., ”BEAST: A fast block cipher for arbitrary blocksize”, (ed. Hoprster, P.), Proc. IFIP'96, Conference on Communication and Multimedia Security, Chapman & Hall, 1996, pp. 144–153.Google Scholar
  17. [Luck98a]
    Lucks, S., ”Attacking Triple Encryption”, Proc. Fast Software Encryption 5, 1998, (ed. S. Vaudenay), LNCS 1372, Springer, 1998.Google Scholar
  18. [Luck98b]
    Lucks, S., ”On the Power of Whitening”, Manuscript, UniverstitÄt Mannheim, FakultÄt für Mathematik und Informatik, 1998.Google Scholar
  19. [LuWe98a]
    Lucks, S., Weis, R., ”How to Encrypt with Rabin”, Technical Report, UniverstitÄt Mannheim, FakultÄt Mathematik und Informatik, 1998.Google Scholar
  20. [LuWe98b]
    Lucks, S., Weis, R., ”Improced Security throw Redundant Random Oracle”, Technical Report, UniverstitÄt Mannheim, FakultÄt Mathematik und Informatik, 1998.Google Scholar
  21. [MaBr94]
    Macedonia, M.R., Brutzmann, D.P., ”MBone Provides Audio and Video Across the Internet”, IEEE Computer. 27(4), 1994.Google Scholar
  22. [Maea96]
    Maly, K., Wild, C., Overstreet, C., Abdel-Wahab, H., Gupta, A., Youssef, A., Stoica, E., Talla, R.,Prabhu, A., ”Virtual Classrooms and Interactive Remote Instruction”, International Journal of Innovations in Education”, 34(1), 1996, pp. 44–51.Google Scholar
  23. [MERCI98]
    Multimedia European Research Conferencing Integration, Telematics for Research Project 1007, 1996–1998. http://www-mice.cs.ucl.ac.uk/mice/ merci/Google Scholar
  24. [OPGP97]
    Callas, J., Donnerhacke, L., Finnley, H., ”OP Formats — OpenPGP Message Format”, Internet Draft, November 1997.Google Scholar
  25. [Oust94]
    Ousterhout, J. K., ”Tcl and Tk Toolkit”, Addison-Wesley, 1994.Google Scholar
  26. [RFC2144]
    Adams, C., ”The CAST-128 Encryption Algorithm”, May 1997.Google Scholar
  27. [RiSh96]
    Rivest, R., Shamir, A., ”Payword and Micromint”, to appear, http://theory.lcs.mit.edu/ rivest/RivestShamir-mpay.psGoogle Scholar
  28. [Schn94]
    Schneier, B., ”Description of a New Variable-Length Key, 64-Bit Block Cipher”, Proc. Cambridge Security Workshop on Fast Software Encryption, LNCS 809, Springer, 1994, pp. 191–204.Google Scholar
  29. [Schea96]
    Schulzrinne, H., Casner, S., Frederick, R., Jacobsen, V., ”RTP: A Transport Protocol for Real-Time Applications”, Internet RfC 1889, IETF, Audio-Video Transport Working Group, 1996.Google Scholar
  30. [TeDr98]
    Part of the Telematics for Research Project 1007 MERCI, 1996–1998. http://www.uni-stuttgart.de/Rus/Projects/MERCI/MERCI/TeleDraw/Info.htmlGoogle Scholar
  31. [Weis98]
    Weis, R., ”Moderne Blockchiffrierer” (in German), in: ”Kryptographie”, Weka-Fachzeitschriften-Verlag, Poing, 1998.Google Scholar
  32. [WeLu98]
    Weis, R., Lucks,S., ”Faster Software Encryption”, Technical Report, UniverstitÄt Mannheim, FakultÄt Mathematik und Informatik, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Werner Geyer
    • 1
  • Rüdiger Weis
    • 1
  1. 1.Praktische Informatik IVUniversity of MannheimMannheimGermany

Personalised recommendations