Presents Fall Forum 2002. H.235 Security Status Quo and Perspectives Presented by Martin Euchner, Rapporteur Q.G/16 Siemens AG.

Slides:



Advertisements
Similar presentations
H.235 Authentication, Integrity and Encryption Adi Regev Sr. Director Sales Engineering & Customer Support.
Advertisements

Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
H.323 Recommended by ITU-T for implementing packet-based multimedia conferencing over LAN that cannot guarantee QoS. Specifying protocols, methods and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Packet Based Multimedia Communication Systems H.323 & Voice Over IP Outline 1. H.323 Components 2. H.323 Zone 3. Protocols specified by H Terminal.
H.323 Recommendation published by ITU Ties together a number of protocols to allow multimedia transmission through an unreliable packet-based network 1996:
NORM PI Update draft-ietf-rmt-pi-norm-revised-04 68th IETF - Prague Brian Adamson NRL.
1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Mobility Solutions BCMCS Key Derivation Procedure Harmonization with IETF SRTP.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Impacts of Security Protocols on Real- time Multimedia Communications Kihun Hong 1, Souhwan Jung 1, Luigi Lo Iacono 2, Christoph.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Fall Forum -- Keystone, Colorado USA -- November, 1999.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
H.323: Multimedia Conferencing for Packet Switched Networks Dave Lindbergh Manager, Technical Standards Group PictureTel.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Hybrid Cipher encryption Plain Text Key Cipher Text Key Plain Text IV Hybrid Cipher decryption Hybrid Cipher Note: IV used in encryption is not used in.
Authentication Methods and Security in Videoconferencing Systems TERENA AA-Workshop Malaga, November 2003 Dimitris Daskopoulos GRNET.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Best Practices Working Group June 19-21, 2001 Munich, Germany.
Protocols Suite By: Aleksandr Gidenko. What is H.323? H.323 is a multimedia conferencing protocol for voice, video and data over IP-based networks that.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
SIP Security BY, Vivek Nemarugommula. vulnerabilities Registration Hijacking.
HDCP1.4+ Material for Certification 10 August 2012 Sony Corporation 2012/8/10 Sony Confidential 1.
RTP Encryption for 3G Networks Rolf Blom, Elisabetta Carrara, Karl Norrman, Mats Näslund Communications Security Lab Ericsson.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
IETF 60 – San Diegodraft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Aravind.
RADIUS Crypto-Agility Requirements November 18, 2008 David B. Nelson IETF 73 Minneapolis.
Network Security David Lazăr.
M337 Standards Based Video Interop Interoperability modelling for Video Skype for Business Video Interoperability Server (VIS)
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Session Recording Protocol Requirements IETF 75, Stockholm (Leon Portman on behalf of the team)
Presents H.323 Forum ITU-T SG16 With Focus on H.323 Activities Presented by Paul E. Jones Rapporteur ITU-T Q2/16 Cisco Systems.
Session Recording (SIPREC) Protocol (draft-ietf-siprec-protocol-09) Leon Portman Henry Lum
GTP (Generic Tunneling Protocol) Alessio Casati/Lucent Technologies Charles E. Perkins/Nokia Research IETF 47 draft-casati-gtp-00.txt.
ITU-TSG16 IMTC – H.323 Forum – May 2002 ITU-T Study Group 16 activities and H.323 Simão Ferraz de Campos Neto Counsellor – ITU-T Study Group 16 Multimedia.
1 SIP Requirements for SRTP Keying Dan Wing IETF 66 v4.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
Audio/Video Transport Core Maintenance Working Group Magnus Westerlund Roni Even Jabber room:
Dec GPP2 TSG-X PDS 1 BCMCS Higher-Layer Encryption Raymond Hsu, Jun Wang Qualcomm Inc. Dec Notice QUALCOMM Incorporated grants a free, irrevocable.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
A RTCP-based Retransmission Protocol for Unicast RTP Streaming Multimedia draft-podolsky-avt-rtprx-00.txt Matthew Podolsky, Koichi Yano, and Steven McCanne.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 EAP-MAKE2: EAP method for Mutual Authentication and Key Establishment, v2 EMU BoF Michaela Vanderveen IETF 64 November 2005.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
SDP Security Descriptions for Media Streams draft-ietf-mmusic-sdescriptions-02.txt November 14, 2003 Flemming Andreasen Mark Baugher.
Telepresence Interoperability Protocol (TIP) Overview for IMTC SuperOp 2010 Workshop 1 Allyn Romanow Cisco Telepresence Systems Business Unit (TSBU) 15.
Presents Fall Forum The H.323 Revolution Presented by Eli Orr October 2002.
Channel Control Interim substates for adding new slaves
Audio/Video Transport Working Group
IMTC SIP Interconnect and SuperOp
IMTC SIP Interconnect and SuperOp
BPSEC Updates Edward Birrane
Proposal for VoIP term project
What’s in draft-rosen-rue?
Relay User Machine (rum)
Guidelines for using the Multiplexing Features of RTP to Support Multiple Media Streams draft-ietf-avtcore-multiplex-guidelines-06 Magnus.
Presentation transcript:

Presents Fall Forum 2002

H.235 Security Status Quo and Perspectives Presented by Martin Euchner, Rapporteur Q.G/16 Siemens AG

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Outline Status Quo of H.235 Some insights into work under development

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Evolution of H Initial Draft H.323V2 H.323V4 H.323V5 H.235V1 approved Core Security Framework Engineering Consolidation Improvement and Additions 1st Deployment H.235V2 Annex D Annex E approved Annex F H.530 consent H.235V3 consent H.235 Annex G consent Security Profiles Annex D Annex E started

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Status of H.235 and related Recommendations Approved and published: H.235 Version 2 (2000): Main text including Annex D “Baseline Security Profile” Annex E “Signature Security Profile” H.235 Annex F “Hybrid PKI Security Profile“ H.323 Annex J “Security for SETs” H.530 “Mobility Security in H.510”

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Work under development Scheduled for consent AAP: 5/2003 Draft H.235 V3 Draft H.235 Annex G “SRTP Usage“

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Draft H.235 Version 3 Features Annex D “Authentication-Only” Option for improved NAT/FW traversal of the security protocol Acknowledged and more robust key update mechanism Encrypted H.245 inband DTMF signaling OIDs for AES encryption algorithm and (E)OFB mode 1536-bit Diffie-Hellman group defined for high security Key distribution procedure on the RAS channel Enhanced error return codes Secure multiple payload stream and secure MoIP (tbd) …

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA Draft H.235 Annex G “SRTP Usage“ Goals Make IETF Secure RTP Protocol available to H.235- based systems Be interoperable with other SRTP terminals Use a stream cipher for improved performance, robustness and security Yield the improved security for RTCP protection Obtain improved integrity spanning the entire RTP/RTCP packet Deploy state-of-the art AES encryption algorithm, Use session encryption/authentication keys derived from a pseudo-random function at both ends

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA H.235 Annex G Approach Provide integration with key management for SRTP and SRTCP Address fast connect with forward and reverse logical channels Negotiate SRTP features Negotiate a SRTP master key(s) and derive SRTP/SRTCP session keys Use also IETF MIKEY Key Management???

Sponsored in part by: IMTC Fall Forum – November 2002 – New York, NY, USA