ImageVerifierCode 换一换
格式:PDF , 页数:28 ,大小:266.03KB ,
资源ID:797431      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-797431.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf)为本站会员(赵齐羽)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf

1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T H.233TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2002) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMSInfrastructure of audiovisual services Systems aspects Confidentiality system for audiovisual services ITU-T Recommendation H.233 ITU-T H-SERIES REC

2、OMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchronization H.220H.229 Systems aspects H.230H.239 Communication procedures H.240H.259 Coding of moving vi

3、deo H.260H.279 Related systems aspects H.280H.299 SYSTEMS AND TERMINAL EQUIPMENT FOR AUDIOVISUAL SERVICES H.300H.399 SUPPLEMENTARY SERVICES FOR MULTIMEDIA H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions, protocols and procedures H.500H.509 Mobilit

4、y for H-Series multimedia systems and services H.510H.519 Mobile multimedia collaboration applications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and services H.540H.549 Mobility interworking proced

5、ures H.550H.559 Mobile multimedia collaboration inter-working procedures H.560H.569 For further details, please refer to the list of ITU-T Recommendations. ITU-T Rec. H.233 (11/2002) i ITU-T Recommendation H.233 Confidentiality system for audiovisual services Summary This Recommendation describes th

6、e confidentiality part of a privacy system suitable for use in narrow-band audiovisual services conforming to ITU-T Recs H.320, H.221, H.230 and H.242. Although an encryption algorithm is required for such a privacy system, the specifications of such algorithms are not all included here: the system

7、caters for more than one specific algorithm. Some of those algorithms and their parameters are defined in Annex A. A privacy system consists of two parts, the confidentiality mechanism or encryption process for the data, and a key management subsystem as described in ITU-T Rec. H.234. This revised v

8、ersion of ITU-T Rec. H.233 introduces a number of corrections and clarifications to the original version and, more importantly, introduces the description on the usage of Triple DES and AES encryption in applicable H.320.x-series Recommendations. Source ITU-T Recommendation H.233 was revised by ITU-

9、T Study Group 16 (2001-2004) and approved under the WTSA Resolution 1 procedure on 29 November 2002. ii ITU-T Rec. H.233 (11/2002) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardi

10、zation Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which

11、meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-

12、Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU dra

13、ws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members o

14、r others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represe

15、nt the latest information and are therefore strongly urged to consult the TSB patent database. ITU 2003 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. H.233 (11/2002) iii CONTENTS Page 1 Scope 1 2 N

16、ormative references 1 3 Abbreviations 1 4 Properties of the system specified 2 4.1 Confidentiality 2 4.2 Algorithm specification 2 5 The confidentiality mechanism 2 5.1 Description of operation. 2 5.1.1 Controls and indication within the H.221 frame 3 5.1.2 Message formats. 3 5.1.3 Unenciphered ECS

17、channel 4 5.2 Transmission encryption method . 8 5.3 Procedure for use of the system 9 6 Encryption of MLP channel 9 Annex A Encryption algorithms and their parameters 9 A.1 Scope 9 A.2 Normative References 9 A.3 FEAL 10 A.4 DES. 12 A.5 IDEA. 12 A.6 TDEA . 12 A.7 AES. 13 Appendix I Encryption and de

18、cryption for 2 B channels 15 Appendix II Audiovisual privacy communication procedure. 17 ITU-T Rec. H.233 (11/2002) 1 ITU-T Recommendation H.233 Confidentiality system for audiovisual services 1 Scope A privacy system consists of two parts, the confidentiality mechanism or encryption process for the

19、 data, and a key management subsystem. This Recommendation describes the confidentiality part of a privacy system suitable for use in narrow-band audiovisual services conforming to ITU-T Recs H.221, H.230 and H.242. Although an encryption algorithm is required for such a privacy system, the specific

20、ation of such an algorithm is not included here: the system caters for more than one specific algorithm. The confidentiality system is applicable to point-to-point links between terminals or between a terminal and a Multipoint Control Unit (MCU); it may be extended to multipoint working in which the

21、re is no decryption at the MCU, but this is for further study. 2 Normative references The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated we

22、re valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommend

23、ations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. 1 ITU Recommendation H.221 (1999), Frame structure for a 64 to 1920 kbit/s channel in audiovisual teleservices. 2 ITU Recommendation H.24

24、2 (1999), System for establishing communication between audiovisual terminals using digital channels up to 2 Mbit/s. 3 ITU Recommendation H.230 (1999), Frame-synchronous control and indication signals for audiovisual systems. 4 ITU Recommendation X.680 (2002), Information technology Abstract Syntax

25、Notation One (ASN.1): Specification of basic notation. 5 ITU Recommendation H.234 (2002), Encryption key management and authentication system for audiovisual services. 6 ISO 8732:1988, Banking Key management (wholesale). 3 Abbreviations This Recommendation uses the following abbreviations: AIA Audio

26、 Indicate Active (Control keys are provided by other mechanisms such as that described in ITU-T Rec. H.234 on Authentication and Key Management, or may be manually entered. 2) It is applicable to audiovisual signals framed according to ITU-T Rec. H.221, at transfer rates of p 64 kbit/s where p takes

27、 any one value from 1 to 30. In accordance with ITU-T Rec. H.221, the FAS, BAS, and ECS channels of the frame structure are not encrypted. 3) Confidentiality is given to all user audio, video and data transmissions, these signals being encrypted together under the same key (this currently includes M

28、LP data, according to Annex A/H.221, though this aspect is for further study). 4) The system is independent of the encryption algorithm used; some algorithms are currently provided for, and further algorithms could be added. 5) The confidentiality mechanism is capable of working in point-to-point ca

29、lls, and also in multipoint calls where decryption is permitted at the MCU (the so-called “trusted MCU“). 4.2 Algorithm specification The specification of algorithms is not included in this Recommendation, which caters to a wide range of encryption algorithms. The specifications may be defined in An

30、nex A, or shall be available elsewhere (see 5.2) and shall contain the following details: lengths of initialization vector and session keys; generation of starting variable from initialization vector. 5 The confidentiality mechanism 5.1 Description of operation Figure 1 gives a block diagram of a li

31、nk encryptor. It consists of an encryptor block and a decryptor block. The encryptor takes in user data and enciphers it to form enciphered data. The decryptor takes enciphered data and deciphers it to obtain user data. ITU-T Rec. H.233 (11/2002) 3 Two channels are needed to connect the encryptor an

32、d decryptor. One is used to transmit the enciphered user data. The second is an unenciphered channel known as the Encryption Control Signal (ECS) which is used to pass control information from the encryptor to the decryptor. Although these two channels are shown physically separated, in practice, th

33、ey are multiplexed into a single frame structure as shown in ITU-T Rec. H.221. Additive-stream encipherment techniques are used (see 5.2). Keys are provided by other mechanisms and are presented to the confidentiality mechanism as required. They are used by the encryptor and decryptor synchronously

34、with the data, the key-loading synchronization flag being sent via the control channel (see L in 5.1.3). Data encipherment is controlled from the encryptor: the encryption ON/OFF flag is sent via the control channel to indicate when data is being enciphered. The decryptor responds to this flag and d

35、eciphers data when requested. H.233_F01Sender Transmission channel ReceiverKeys KeysUser dataRecovereduser dataEncryptor DecryptorEncyphered datachannelPlain data control channelInitialization vectorsFigure 1/H.233 Block diagram of a link encryptor 5.1.1 Controls and indication within the H.221 fram

36、e To indicate the presence of a confidentiality system within a terminal the BAS code “Encryption capability“ shall be transmitted. If this capability is signalled from both ends of a link, the Encryption Control Signal (ECS) channel may be opened in each direction by use of the encrypt-on BAS comma

37、nd; the ECS channel may be closed using the command encrypt-off, but this shall be preceded by the transmission of the encryption-off flag within the channel itself (see below). If a terminal receives the BAS command encrypt-off without first receiving the encryption-off flag, the user shall be aler

38、ted to a possible intrusion or malfunction of the confidentiality system. In cases where an H.221-framed signal is in use in one direction only, the ECS channel may be activated without use of the capability mechanism: the mechanism to ensure that the receiving end is able to decrypt the chosen algo

39、rithm, etc., is outside the scope of this Recommendation. 5.1.2 Message formats The messages used by the encryption system for key distribution and authentication are formatted in a nested ILC (Identifier, Length, Content) form as described in ITU-T Rec. X.680 4. The length may be encoded in short f

40、orm or long form. The indefinite form as defined in 4 will not be used. A short description of some of the ITU-T Rec. X.680 4 definitions used within this Recommendation is given below. 4 ITU-T Rec. H.233 (11/2002) 5.1.2.1 Identifier An identifier is an octet with the structure shown next. MSB LSB c

41、cpttttt c Tag class p Primitive/constructor (0/1) t Tag The tag class defines the type of identifier and takes a value of 10 or 11 (context specific). The primitive/constructor (P) bit indicates whether the content is primitive or whether it is composed of nested elements. The 5-bit tag uniquely def

42、ines the identifier (according to its class). Thus, all identifiers in this Recommendation have the octet form: 10 P t1t2t3t4t5or 11 P t1t2t3t4t5. 5.1.2.2 Length The length specifies the length in octets of the contents and is itself variable in length. The short form is one octet long and shall be

43、used in preference to the long form when L is less than 128. Bit 8 has the value zero and bits 7-1 encode L as an unsigned binary number whose MSB and LSB are bit 7 and bit 1, respectively. The Long form is from 2 to 127 octets long and is used when L is greater than, or equal to, 128 and less than

44、2 to the power 1008. Bit 8 of the first octet has the value one. Bits 7-1 of the first octet encode a number one less than the size of the length in octets as an unsigned binary number whose MSB and LSB are bit 7 and bit 1, respectively. L itself is encoded as an unsigned binary number whose MSB and

45、 LSB are bit 8 of the second octet and bit 1 of the last octet, respectively. This binary number shall be encoded in the fewest possible octets, with no leading octets containing the value 0. 5.1.2.3 Bit string A bit string in primitive form has the bits packed eight to an octet and preceded by an o

46、ctet that encodes the number of unused bits in the final octet of the contents, from zero to seven, as an unsigned binary number those MSB and LSB are bit 8 and bit 1, respectively. 5.1.3 Unenciphered ECS channel The confidentiality system requires the use of an unenciphered control channel between

47、encryptor and decryptor. Only one control channel per link encryption system is required. The same control channel is used in association with the encryption of the audio, video and any data that may be present. The content of the ECS channel is structured in blocks of 128 bits, synchronous with the

48、 H.221 multiframe (see Figure 2); thus the first bit of the block is bit 8 of octet 17 of frame number 0 in a multiframe. There are two types of block: Session Exchange (SE) and Initialization Vector (IV). The information contained within an IV block takes effect from the start of the next multifram

49、e, and remains effective until another IV has been sent. The ECS channel shall always contain either an IV block or an SE block. It shall be noted that according to some algorithm definitions the same IV may be loaded repeatedly; the choice as to whether or not to do this would be based on the trade-off between faster recovery from errors and additional security. ITU-T Rec. H.233 (11/2002) 5 Bit No. 0 1 2 3 4 5 6 7 8 9 10 11 | 12-119 | 120-127 SE Type 0 n n s s s s s e e e e | message | spare Bit No. 0 1 2 3 4 5 6 7 8 9 10 11 | 12-1

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1