Encryption Whitepaper



Similar documents
Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

PCS-G50 PCS-G70. Video Communication System. Frequently Asked Questions (FAQ)

Using the Streaming & Recording Features

Secured Communications using Linphone & Flexisip

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

1.0 Scope: 2.0 Site Status and Site Visit:

How To Understand The Technical Specifications Of Videoconferencing

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0

Grandstream Networks, Inc.

TANDBERG s Embedded MCU

CHAPTER 1 INTRODUCTION

ClickShare Network Integration

Polycom RealPresence Mobile for Apple iphone

Nakina Multi-Vendor Security Management Secure Your Network Operations

IronKey Data Encryption Methods

Security Policy Revision Date: 23 April 2009

The Evolution of Video Conferencing: UltimateHD

Corporate Presentation

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece

CTX OVERVIEW. Ucentrik CTX

Polycom RealPresence Mobile for Apple ipad

Cisco TelePresence SX10 Quick Set

Computer System Management: Hosting Servers, Miscellaneous

GTS VIDEOCONFERENCE. Powered by: Valid from: 1 June 2014

Cisco TelePresence MCU 4500 Series

PCS-XG80/PCS-XG80S. HD Visual Communication Systems.

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

How To Compare Video Resolution To Video On A Computer Or Tablet Or Ipad Or Ipa Or Ipo Or Ipom Or Iporom Or A Tv Or Ipro Or Ipot Or A Computer (Or A Tv) Or A Webcam Or

Introducing your Intelligent Monitoring Software. Designed for security.

PCS-XG100 / PCS-XG100S PCS-XG77 / PCS-XG77S HD Visual Communication Systems

SNC-VL10P Video Network Camera

Cisco TelePresence MCU MSE 8420

Video Communication System PCS-G50 INTEGRATED VISUAL COMMUNICATION

Polycom Competitive Q1 08

Unified Communications Drive Protocol Convergence

SCOPIA XT5000 Series. User Guide. Version 3.0

Mobile videoconferencing system

How To Build A Network Cardio On A Computer Ora (Networking) With A Network (Netio) And A Network On A Network With A Microsoft Powerbook (Netnet) (Netro) (Network) (Powerbook

Cisco TelePresence Multipoint Switch Meeting Types

LifeSize UVC Multipoint Deployment Guide

Video Conferencing Standards

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Computer Networks. Voice over IP (VoIP) Professor Richard Harris School of Engineering and Advanced Technology (SEAT)

Conditions affecting performance of a WebEx session.

Visocall IP PBX Connection

Cisco TelePresence MX Series

Glossary of Terms and Acronyms for Videoconferencing

Cisco TelePresence SX20 Quick Set

Cisco WebEx Telepresence

SCOPIA iview Communications Manager

Cloud Video. Data Sheet

Cisco TelePresence SX20 Quick Set

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services

Polycom RealPresence Desktop for Windows

LifeSize Desktop Installation Guide

Chapter 23. Database Security. Security Issues. Database Security

HD Visual Communication Systems PCS-XG80/PCS-XG80S

Video Conferencing Glossary of Terms

Applications that Benefit from IPv6

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Cisco TelePresence System Educator MXP

HDX 7000 vs. HDX 8000 vs. HDX 9000 Codecs

DVCrypt Conditional Access System

An Overview of Communication Manager Transport and Storage Encryption Algorithms

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Quick Start Guide. Vodafone Mobile Wi-Fi Vodafone R201

Video Conferencing Unit. by Murat Tasan

Cisco TelePresence MCU MSE 8510

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Features and Benefits

VIDEO CONFERENCE. Alessandro Benni & VIDEO COMMUNICATIONS. Bologna, Videorent srl - Video & Multimedia Branch

Cisco TelePresence Video Systems

Need for Signaling and Call Control

Video Communication System PCS-1 PCS-1P

Software Version

IOCOM Whitepaper: Connecting to Third Party Organizations

Cisco TelePresence SX20 Quick Set

Cisco TelePresence SX20 Quick Set

Date of Test: 5th 12th November 2015

Cisco TelePresence Quick Set C20

Internet Desktop Video Conferencing

Indepth Voice over IP and SIP Networking Course

VIDEOCONFERENCING. Video class

Transcription:

Encryption Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc

Introduction Sony s videoconferencing products encrypt video and audio data. Encryption provides secure connections and protects data from unexpected modifi cation by hackers or other outsiders. Sony uses two types of encryption technologies. One is an ITU-T standard-based format. This format allows Sony products, as well as other manufacturer s products, to communicate with each other, provided they support ITU-T encryption. The other format is a Sony proprietary encryption standard, which is supported only over IP connections. A common password is required for all attendees to participate in the same conference, which creates a more secure connection. All Sony s videoconferencing products provide both encryption formats as standard functions, rather than as options.

Both ITU-T standard and Sony proprietary formats use Advanced Encryption Standard (AES). AES was fi nally chosen by Belgian mathematicians, Joan Daemon and Vincent Rijmen, as the most advanced encryption method from among the many proposals submitted from around the world. The intention was to replace the former standard, Data Encryption Standard (DES); therefore, AES is far more reliable than DES. AES employs a common encryption key for both encoding and decoding. From the sending end, the digital data stream is divided into multiple blocks of 128 bits each, which are then encoded by a key. At the receiving end, the data blocks are decoded by the same key and the original data is restored. The key length of AES can be chosen from among 128bits, 192bits, and 256bits. With a key length of 128bits, a hacker would require 2128 (2 to the power of 128) trials to fi nd the correct key. This key length is relatively secure, considering the security of the computer used. If encryption keys are not shared securely, encryption may fail, no matter how advanced AES is; therefore the key exchange system is very important. The method for exchanging keys is different between ITU-T standard and Sony proprietary formats. ITU-T uses a method called Diffi e-hellman key exchange protocol, and Sony uses a Sony original protocol. The Diffi e- Hellman key exchange protocol, which was invented by Whitfi eld Diffi e and Martin E. Hellman, uses a mathematical diffi culty that is not inherent in exchanging the key itself but is inherent in exchanging data and random numbers generated from the key. Thanks to this diffi culty, common keys are shared securely at each end, and managing the key is not an issue. Sony s proprietary format uses a unique Sony-invented key exchange protocol. A key is generated based on a password entered by the user. Because the password is scrambled, it is sent securely to the far end. The participant of the encrypted conference uses the password in common, which helps to prevent spoofi ng. Encryption formats ITU-T (International Telecommunication Union-Telecommunication Standardisation Sector) defi ned security and encryption as recommendations of H.233, H.234, and H.235. Both H.233 and H.234 defi ne encryption key management and the authentication system for connections over ISDN (H.320) connections. H.233 defi nes the encryption system for media, and H.234 defi nes the total signaling protocol for encrypted communication, including key exchange. The H.235 recommendation describes encryption protocols over IP (H.323) connections. AES is supported under H.235 version 3. Sony s PCS series videoconferencing products follow these international standards when ITU-T mode is selected at the start of an encrypted conference. The data media encrypted are: Audio, video, far-end camera control data, PC screen images via DSB (Data Solution Box), data drawn on an electric white board, and the second video stream during Dual Video mode. Encryption is supported in both point-to-point and multipoint connections. Encryption is also supported in mixed IP (H.323) and ISDN (H.320) connections. Encryption formats Key exchange system IT-UT international standard protocol

Sony proprietary protocol Sony s proprietary encryption protocol is supported in all IP connections, including H.323 and SIP protocols. ISDN connections (which are more secure than IP connections) are not supported. The data media encrypted are: Audio, video, PC screen images via DSB, and the second video stream during Dual Video mode. Encryption is supported in both point-to-point and multipoint connections, regardless of mixed H.323 and SIP connections.

Relationship between confi guration and encryption support (Table 1) During point-to-point connectionframe rate: Max. 15 fps Sony proprietary protocol SONY encryption Standard encryption Point-to-Point IP ISDN SIP N/A N/A (Table 2) During multipoint connection Multipoint IP Only ISDN Only SIP Only IP&SIP IP&ISDN SIP&ISDN IP&ISDN&SIP SONY N/A N/A N/A N/A encryption Standard N/A N/A N/A N/A encryption

Sony and IPELA are registered trademarks of the Sony Corporation, Japan. All other trademarks are the property of their respective owners. White Paper www.sonybiz.net/vc