Skip to main content

Cryptographic Algorithms for Multimedia Traffic

  • Conference paper
Foundations of Security Analysis and Design II (FOSAD 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2946))

Included in the following conference series:

  • 240 Accesses

Abstract

We survey several cryptographic algorithms that provide authentication and confidentiality for multimedia traffic over the Internet. We focus in particular on the problem of authenticating streams of data and on the problem of secure multicast, where streamed information is sent to a dynamic group of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Bergadano, F., Crispo, B., Lee, J., Manifavas, C., Needham, R.: A New Family of Authentication Protocols. Operating Systems Review 32(4), 9–20 (1998)

    Article  Google Scholar 

  2. Bergadano, F., Cavagnino, D., Crispo, B.: Individual Source Authentication on the MBONE. In: Proceedings of ICME (2000)

    Google Scholar 

  3. Boneh, D., Franklin, M.: An Efficient Public-Key Traitor Tracing Scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 338–353. Springer, Heidelberg (1999)

    Google Scholar 

  4. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: Proceedings of INFOCOM (1999)

    Google Scholar 

  5. Cheung, S.: An Efficient Message Authentication Scheme for Link State Routing. In: Proceedings of the 13th Annual Computer Security Applications Conference (1997)

    Google Scholar 

  6. Chor, B., Fiat, A., Naor, M.: Tracing Traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257–270. Springer, Heidelberg (1994)

    Google Scholar 

  7. Chor, B., Fiat, A., Naor, M., Pinkas, B.: Tracing Traitors. IEEE Transactions on Information Theory 46(3) (May 2000)

    Google Scholar 

  8. Fiat, A., Naor, M.: Broadcast Encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994)

    Google Scholar 

  9. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. Information and Computation 165, 100–116 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  10. Goldwasser, S., Micali, S., Rivest, R.: A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack. SIAM J. Comp. 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  11. Lamport, L.: Constructing Digital Signatures from a One-Way Function. Technical Report SRI Intl. CSL 98 (1979)

    Google Scholar 

  12. Merkle, R.: A Digital Signature based on a Conventional Encryption Function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  13. Merkle, R.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  14. Naor, D., Naor, M., Lotspiech, J.: Revocation and Tracing Schemes for Stateless Receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41–62. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  15. National Institute of Standard and Technology. Secure Hash Standard. NIST FIPS Pub 180-1 (1995)

    Google Scholar 

  16. Perrig, A., Canetti, R., Tygar, J., Song, D.: Efficient Authentication and Signature of Multicast Streams over Lossy Channels. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  17. Rohatgi, P.: A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In: Proceedings of ACM CCS 1999, pp. 93–100 (1999)

    Google Scholar 

  18. Stinson, D.: Cryptography. Theory and Practice. CRC Press, Boca Raton (1996)

    Google Scholar 

  19. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. IETF Draft wallner-key (July 1997), Available from ftp://ftp.ietf.org/internet-drafts/draft-wallner-key-arch-01.txt

  20. Wong, C., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: SIGCOMM (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gennaro, R. (2004). Cryptographic Algorithms for Multimedia Traffic. In: Focardi, R., Gorrieri, R. (eds) Foundations of Security Analysis and Design II. FOSAD 2001. Lecture Notes in Computer Science, vol 2946. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24631-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24631-2_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20955-3

  • Online ISBN: 978-3-540-24631-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics