Skip to main content

How to Make a Digital Whiteboard Secure-Using JAVA-Cards for Multimedia Applications

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1905))

Abstract

In this paper we propose a light-weight, provable secure smart card integration for the OpenPGP secure message format. The basic idea is that the secret keys are stored on a smart card and never leave it. We have integrated this new security approach into an enhanced whiteboard, the digital lecture board (dlb). Existing whiteboards neglect security mechanisms almost completely, even though these mechanisms are extremely important to allow confidential private sessions and billing. The primary application field of our concept are small and closed groups, whereas the smart card serves to testify group membership. Our first implementation supports the JAVA i-Button which provides an additional hardware security.

A part of this research was done while the author was at the University of Mannheim.

Since 15. March 2000: IBM, T.J. Watson Research, USA.

Supported by the Deutsche Forschungsgemeinschaft (DFG) grant KR1521

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, C.,”CAST-256”, AES submission, 1998.

    Google Scholar 

  2. Bakker, B., Weis, R., Lucks, S., ”How to Ring a S/WAN. Adding tamper resistant authentication to Linux IPSec”, SANE2000-2nd International System Administration and Networking Conference, Maastricht, 2000.

    Google Scholar 

  3. Blaze, M., ”High-Bandwidth Encryption with Low-Bandwidth Smartcards”, Fast Software Encryption, Springer LNCS 1039 1996.

    Google Scholar 

  4. Blaze, M., Feigenbaum, J., and Naor, M., ”A Formal Treatment of Remotely Keyed Encryption”, Eurocrypt’ 98, Springer LNCS 1403, 1998.

    Google Scholar 

  5. Callas, J., Donnerhacke, L., Finnley, H., ”OP Formats-OpenPGP Message Format”, Internet Draft, November 1997.

    Google Scholar 

  6. Daemen, J., Rijmen, V., ”Rijndael”, AES submission, 1998. http://www.esat.kuleuven.ac.be/rijmen/rijndael/

  7. DallasSemiconductors, iButton Hompage: http://www.ibutton.com/

  8. Effelsberg, W., Geyer, W., ”Tools for Digital Lecturing-What We Have and What We Need”, Proc. BITE’ 98, Bringing Information Technology to Education, Integrating Information & Communication Technology in Higher Education, Maastricht, Netherlands, March 1998.

    Google Scholar 

  9. ElectronicFrontier Foundation”EFF press release (July 17, 1998): EFF Builds DES Cracker that proves that Data Encryption Standard is insecure”, http://www.eff.org/descracker/

  10. Geyer, W., ”The digital lecture board (dlb)” http://www.informatik.uni-mannheim.de/ geyer/dlb/dlb.eng.html

  11. Geyer, W., ”Das digital lecture board-Konzeption, Design und Entwick-lung eines Whiteboards für synchrones Teleteaching” (in German), Reihe DISDBIS, Bd. 58, ISBN 3-89601-458-7, Infix-Verlag, St. Augustin, 1999.

    Google Scholar 

  12. Geyer, W., Effelsberg, W., ”The Digital Lecture Board-A Teaching and Learning Tool for Remote Instruction in Higher Education”, ED-MEDIA’ 98, Freiburg, Germany, June 1998.

    Google Scholar 

  13. Geyer, W., Weis, R., ”A Secure, Accountable, and Collaborative Whiteboard”, Workshop on Interactive Distributed Multimedia Systems and Services, IDMS’ 98, Oslo, September 1998.

    Google Scholar 

  14. Geyer, W., Weis, R., ”The Design and the Security Concept of a Collaborative Whiteboard”, Computer Communications 23, Elsevier, 2000.

    Google Scholar 

  15. Grumann, M., ”Entwurf und Implementierung eines zuverlässigen Multicast-Protokolls zur Unterstützung sicherer Gruppenkommunikation in einer TeleTeaching-Umgebung”, Master’s Thesis (in German), Lehrstuhl für Praktische Informatik IV, University of Mannheim, 1997.

    Google Scholar 

  16. Kilian, J., Rogaway, P., ”How to protect DES against exhaustive key search”, Proc. Advances in Cryptology-Crypto’6, Springer, 1996.

    Google Scholar 

  17. Koch, Werner, ”The GNU Privacy Guard”, 1998. http://www.gnupg.org/

  18. Lucks, S., ”On the Security of Remotely Keyed Encryption”, Fast Software Encryption, Springer LNCS, 1997.

    Google Scholar 

  19. Lucks, S., “On the Power of Whitening”, Manuscript, Universtität Mannheim, Fakultät für Mathematik und Informatik, 1998.

    Google Scholar 

  20. Lucks, S., Weis, R., “Remotely Keyed Encryption Using Non-Encrypting Smart Cards”. USENIX Workshop on Smartcard Technology, Chicago, May 10–11, 1999

    Google Scholar 

  21. Lucks, S., Weis, R., “How to Make DES-based Smartcards fit for the 21-st Century”, CARDIS2000, Bristol, Kluwer, 2000.

    Google Scholar 

  22. Schneier, B., ”Applied Cryptography Second Edition”, John Wiley & Sons, New York, NY, 1996.

    Google Scholar 

  23. Schneier, B., Kelsey, J., Whiting, D., Wagner D., Hall, C., Ferguson, N., ”Twofish”, AES submision, 1998.

    Google Scholar 

  24. Schulzrinne, H., Casner, S., Frederick, R., Jacobsen, V., ”RTP: A Transport Protocol for Real-Time Applications”, Internet RFC 1889, IETF, Audio-Video Transport Working Group, 1996.

    Google Scholar 

  25. Weis, R., ”Combined Cryptoanalytic Attacks against Signature and Encryption schemes”, (in German), A la Card aktuell 23/97, S.279, 1997.

    Google Scholar 

  26. Weis, R., ”Moderne Blockchiffrierer” (in German), in: ”Kryptographie”, Weka-Fachzeitschriften-Verlag, Poing, 1998.

    Google Scholar 

  27. Weis, R., ”Crypto Hacking Export Restrictions”, Chaos Communication Camp, Berlin, 1999.

    Google Scholar 

  28. Weis, R., ”A Protocol Improvement for High-Bandwidth Encryption Using Non-Encrypting Smart Cards”, IFIP TC-11, Working Groups 11.1 and 11.2, 7 th Annual Working Conference on Information Security Management & Small Systems Security, Amsterdam, 1999.

    Google Scholar 

  29. Weis, R., ”A Trivial Host Card Encryption Protocol”, Technical Report, Universität Mannheim, Feb. 2000.

    Google Scholar 

  30. Weis, R., Bakker, B., Lucks, S., ”Security on your hand: secure file systems with a ”non-cryptographic” Java-Ring”, IRUSA/INRIA/JAVA CARD FORUM: JAVA CARD Workshop, Cannes, 2000.

    Google Scholar 

  31. Weis, R., Bogk, A., ”Videoencryption with the JAVA i-button”, CE-BIT2000, Hannover, 2000. http://www.informatik.uni-mannheim.de/rweis/cebit2000/

  32. Weis, R., Effelsberg, W., Lucks, S., ”Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Stream”, IEEE International Conference on Multimedia and Expo, New York, Kluwer, July 2000.

    Google Scholar 

  33. Weis, R., Effelsberg, W., Lucks, S., ”Combining Authentication and Light-Weight Payment for Active Networks”, Smartnet2000, Wien, Kluver, 2000.

    Google Scholar 

  34. Weis, R., Kuhn, M., Tron, ”Hacking Chipcards”, Workshop CCC’ 97, Hamburg 1997.

    Google Scholar 

  35. Weis, R., Geyer W., ”Cryptographic Concepts for Online-Feedback in Teleteaching Applications”, Proc. NLT’ 99, Bern, Switzerland, 1999.

    Google Scholar 

  36. Weis, R., Geyer, W., Kuhmünch, C., ”Architectures for Secure Multicast Communication”, SANE2000-2nd International System Administration and Networking Conference, Maastricht, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weis, R., Vogel, J., Effelsberg, W., Geyer, W., Lucks, S. (2000). How to Make a Digital Whiteboard Secure-Using JAVA-Cards for Multimedia Applications. In: Interactive Distributed Multimedia Systems and Telecommunication Services. IDMS 2000. Lecture Notes in Computer Science, vol 1905. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40002-8_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-40002-8_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41130-7

  • Online ISBN: 978-3-540-40002-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics