Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION



Similar documents
Encryption Whitepaper

Security Policy Revision Date: 23 April 2009

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

CHAPTER 1 INTRODUCTION

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Computer System Management: Hosting Servers, Miscellaneous

Using the Streaming & Recording Features

Secured Communications using Linphone & Flexisip

PCS-G50 PCS-G70. Video Communication System. Frequently Asked Questions (FAQ)

Acano solution. Security Considerations. August E

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Blaze Vault Online Backup. Whitepaper Data Security

7! Cryptographic Techniques! A Brief Introduction

An Overview of Communication Manager Transport and Storage Encryption Algorithms

Computer Security: Principles and Practice

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

Application Note. Onsight Mobile Collaboration Video Endpoint Interoperability v5.0

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Security in Near Field Communication (NFC)

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

How To Understand The Technical Specifications Of Videoconferencing

Polycom RealPresence Mobile for Apple ipad

1.0 Scope: 2.0 Site Status and Site Visit:

Chapter 23. Database Security. Security Issues. Database Security

Polycom RealPresence Mobile for Apple iphone

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

TANDBERG s Embedded MCU

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

The Mathematics of the RSA Public-Key Cryptosystem

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

NWIMS. Online Backup Security Documentation

SCOPIA iview Communications Manager

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Applications that Benefit from IPv6

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Corporate Presentation

Video Conferencing Standards

SNAPcell Security Policy Document Version 1.7. Snapshield

The Evolution of Video Conferencing: UltimateHD

Cisco TelePresence MXP Endpoints. Knowledge Base Articles. KNOWLEDGE BASE ARTICLES MXP Endpoints

LifeSize UVC Multipoint Deployment Guide

PCS-XG100 / PCS-XG100S PCS-XG77 / PCS-XG77S HD Visual Communication Systems

Visocall IP PBX Connection

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece

Grandstream Networks, Inc.

How to create a portable encrypted USB Key using TrueCrypt

GTS VIDEOCONFERENCE. Powered by: Valid from: 1 June 2014

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

The next generation of knowledge and expertise Wireless Security Basics

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

BeamYourScreen Security

Network Security - ISA 656 Introduction to Cryptography

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

How To Compare Video Resolution To Video On A Computer Or Tablet Or Ipad Or Ipa Or Ipo Or Ipom Or Iporom Or A Tv Or Ipro Or Ipot Or A Computer (Or A Tv) Or A Webcam Or

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Integrating a Hitachi IP5000 Wireless IP Phone

Video Conferencing Glossary

Indepth Voice over IP and SIP Networking Course

LifeSize Desktop Installation Guide

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

EXAM questions for the course TTM Information Security May Part 1

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Polycom Competitive Q1 08

Software Version

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

VIDEOCONFERENCING. Video class

Unified Communications Drive Protocol Convergence

Lectures for the course: Electronic Commerce Technology (IT 60104)

Safer data transmission using Steganography

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

How To Understand And Understand The History Of Cryptography

Video Communication System PCS-1 PCS-1P

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Transcription:

Encryption PCS-1/1P Ver.3.20 or later PCS-11/11P Ver.3.20 or later PCS-HG90 Ver.2.00 or later PCS-G50/G50P Ver.2.21 or later PCS-G70/G70P Ver.2.21 or later PCS-TL30 Ver.1.04 or later PCS-TL33 All PCS-TL50 Ver.2.21 or later PCS-XG80S All

Introduction Sony's visual communication products (PCS series) encrypt video and audio data. Encryption provides secure connections and protects data from unexpected modification by hackers or other outsiders. Sony uses two types of encryption technologies. One is an ITU-T standard-based format. This format allows Sony products, as well as other manufacturer's products, to communicate with each other, provided they support ITU-T encryption. The other format is a Sony proprietary encryption standard, which is supported only over IP connections. A common password is required for all attendees to participate in the same conference, which creates a more secure connection. Sony's visual communication products provide the encryption formats as standard functions, rather than as options.

Encryption Scheme Encryption Algorithm Both ITU-T standard and Sony proprietary formats use Advanced Encryption Standard (AES). AES is an encryption standard based on the Rijndael algorithm for secret key cryptography which was developed by Belgian mathematicians, Joan Daemon and Vincent Rijmen. AES was finally chosen by the (US) National Institute of Standards and Technology (NIST), as the most advanced encryption method from among the many proposals submitted from around the world. The intention was to replace the former standard, Data Encryption Standard (DES); therefore, AES is far more reliable than DES. AES employs a common encryption key for both encoding and decoding. From the sending end, the digital data stream is divided into multiple blocks of 128 bits each, which are then encoded by a key. At the receiving end, the data blocks are decoded by the same key and the original data is restored. The key length of AES can be chosen from among 128bits, 192bits, and 256bits. With a key length of 128bits, a hacker would require 2 128 (2 to the power of 128) trials to find the correct key. This key length is relatively secure, considering the security of the computer used. Key Exchange System If encryption keys are not shared securely, encryption may fail, no matter how advanced AES is; therefore the key exchange system is very important. The method for exchanging keys is different between ITU-T standard and Sony proprietary formats. ITU-T uses a method called Diffie-Hellman key exchange protocol, and Sony uses a Sony original protocol. The Diffie-Hellman key exchange protocol, which was invented by Whitfield Diffie and Martin E. Hellman, uses a mathematical difficulty that is not inherent in exchanging the key itself but is inherent in exchanging data and random numbers generated from the key. Thanks to this difficulty, common keys are shared securely at each end, and managing the key is not an issue. Sony's proprietary format uses a unique Sony-invented key exchange protocol. A key is generated based on a password entered by the user. Because the password is scrambled, it is sent securely to the far end. The participant of the encrypted conference uses the password in common, which helps to prevent spoofing.

Two Encryption Protocols used for PCS Series ITU-T International Standard Protocol ITU-T (International Telecommunication Union-Telecommunication Standardization Sector) defined security and encryption as recommendations of H.233, H.234, and H.235. Both H.233 and H.234 define encryption key management and the authentication system for connections over ISDN (H.320) connections. H.233 defines the encryption system for media, and H.234 defines the total signaling protocol for encrypted communication, including key exchange. The H.235 recommendation describes encryption protocols over IP (H.323) connections. AES is supported under H.235 version 3. Sony's PCS series videoconferencing systems support the H.233, H.234, and H.235 version 3, and adopt AES with a key length of 128 bit. The data media listed below are encrypted as far as supported by your PCS terminal: Audio, Video Far-end camera control data PC screen images* 1 Second video stream during Dual Video mode* 1 Data drawn on an electric white board* 1 Plotted data input from pen tablet* 1 Encryption is supported in both point-to-point and multipoint connections. Encryption is also supported in mixed IP (H.323) and ISDN (H.320) connections. However, encrypted communication is not possible when connected to Sony network cameras supported by some models. *1: The method for handling this data varies depending on the model. Sony Proprietary Protocol* 2 Sony's proprietary encryption protocol is supported in all IP connections, including H.323 and SIP protocols. ISDN connections (which are more secure than IP connections) are not supported. The data media encrypted are: Audio, Video, PC screen images, and the second video stream on H.323 during Dual Video mode. Encryption is supported in both point-to-point and multipoint connections, regardless of mixed H.323 and SIP connections. *2: The PCS-HG90/XG80S does not support the Sony Proprietary Protocol.

Relationship Between Configuration And Encryption Support (Table 1) During point-to-point connection IP ISDN SIP SONY encryption N/A Standard encryption N/A (Table 2) During multipoint connection IP Only ISDN Only SIP Only IP&SIP IP&ISDN SIP&ISDN IP&ISDN&SIP SONY encryption N/A Standard encryption N/A N/A N/A N/A N/A N/A N/A IPELA is a trademark of Sony Corporation.