ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf

上传人:赵齐羽 文档编号:797431 上传时间:2019-02-02 格式:PDF 页数:28 大小:266.03KB
下载 相关 举报
ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf_第1页
第1页 / 共28页
ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf_第2页
第2页 / 共28页
ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf_第3页
第3页 / 共28页
ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf_第4页
第4页 / 共28页
ITU-T H 233-2002 Confidentiality System for Audiovisual Services Series H Audiovisual and Multimedia Systems Infrastructure of Audiovisual Services - Systems Aspects (Study Group 1.pdf_第5页
第5页 / 共28页
点击查看更多>>
资源描述

1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T H.233TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2002) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMSInfrastructure of audiovisual services Systems aspects Confidentiality system for audiovisual services ITU-T Recommendation H.233 ITU-T H-SERIES REC

2、OMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchronization H.220H.229 Systems aspects H.230H.239 Communication procedures H.240H.259 Coding of moving vi

3、deo H.260H.279 Related systems aspects H.280H.299 SYSTEMS AND TERMINAL EQUIPMENT FOR AUDIOVISUAL SERVICES H.300H.399 SUPPLEMENTARY SERVICES FOR MULTIMEDIA H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions, protocols and procedures H.500H.509 Mobilit

4、y for H-Series multimedia systems and services H.510H.519 Mobile multimedia collaboration applications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and services H.540H.549 Mobility interworking proced

5、ures H.550H.559 Mobile multimedia collaboration inter-working procedures H.560H.569 For further details, please refer to the list of ITU-T Recommendations. ITU-T Rec. H.233 (11/2002) i ITU-T Recommendation H.233 Confidentiality system for audiovisual services Summary This Recommendation describes th

6、e confidentiality part of a privacy system suitable for use in narrow-band audiovisual services conforming to ITU-T Recs H.320, H.221, H.230 and H.242. Although an encryption algorithm is required for such a privacy system, the specifications of such algorithms are not all included here: the system

7、caters for more than one specific algorithm. Some of those algorithms and their parameters are defined in Annex A. A privacy system consists of two parts, the confidentiality mechanism or encryption process for the data, and a key management subsystem as described in ITU-T Rec. H.234. This revised v

8、ersion of ITU-T Rec. H.233 introduces a number of corrections and clarifications to the original version and, more importantly, introduces the description on the usage of Triple DES and AES encryption in applicable H.320.x-series Recommendations. Source ITU-T Recommendation H.233 was revised by ITU-

9、T Study Group 16 (2001-2004) and approved under the WTSA Resolution 1 procedure on 29 November 2002. ii ITU-T Rec. H.233 (11/2002) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardi

10、zation Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which

11、meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-

12、Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU dra

13、ws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members o

14、r others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represe

15、nt the latest information and are therefore strongly urged to consult the TSB patent database. ITU 2003 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. H.233 (11/2002) iii CONTENTS Page 1 Scope 1 2 N

16、ormative references 1 3 Abbreviations 1 4 Properties of the system specified 2 4.1 Confidentiality 2 4.2 Algorithm specification 2 5 The confidentiality mechanism 2 5.1 Description of operation. 2 5.1.1 Controls and indication within the H.221 frame 3 5.1.2 Message formats. 3 5.1.3 Unenciphered ECS

17、channel 4 5.2 Transmission encryption method . 8 5.3 Procedure for use of the system 9 6 Encryption of MLP channel 9 Annex A Encryption algorithms and their parameters 9 A.1 Scope 9 A.2 Normative References 9 A.3 FEAL 10 A.4 DES. 12 A.5 IDEA. 12 A.6 TDEA . 12 A.7 AES. 13 Appendix I Encryption and de

18、cryption for 2 B channels 15 Appendix II Audiovisual privacy communication procedure. 17 ITU-T Rec. H.233 (11/2002) 1 ITU-T Recommendation H.233 Confidentiality system for audiovisual services 1 Scope A privacy system consists of two parts, the confidentiality mechanism or encryption process for the

19、 data, and a key management subsystem. This Recommendation describes the confidentiality part of a privacy system suitable for use in narrow-band audiovisual services conforming to ITU-T Recs H.221, H.230 and H.242. Although an encryption algorithm is required for such a privacy system, the specific

20、ation of such an algorithm is not included here: the system caters for more than one specific algorithm. The confidentiality system is applicable to point-to-point links between terminals or between a terminal and a Multipoint Control Unit (MCU); it may be extended to multipoint working in which the

21、re is no decryption at the MCU, but this is for further study. 2 Normative references The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated we

22、re valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommend

23、ations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. 1 ITU Recommendation H.221 (1999), Frame structure for a 64 to 1920 kbit/s channel in audiovisual teleservices. 2 ITU Recommendation H.24

24、2 (1999), System for establishing communication between audiovisual terminals using digital channels up to 2 Mbit/s. 3 ITU Recommendation H.230 (1999), Frame-synchronous control and indication signals for audiovisual systems. 4 ITU Recommendation X.680 (2002), Information technology Abstract Syntax

25、Notation One (ASN.1): Specification of basic notation. 5 ITU Recommendation H.234 (2002), Encryption key management and authentication system for audiovisual services. 6 ISO 8732:1988, Banking Key management (wholesale). 3 Abbreviations This Recommendation uses the following abbreviations: AIA Audio

26、 Indicate Active (Control keys are provided by other mechanisms such as that described in ITU-T Rec. H.234 on Authentication and Key Management, or may be manually entered. 2) It is applicable to audiovisual signals framed according to ITU-T Rec. H.221, at transfer rates of p 64 kbit/s where p takes

27、 any one value from 1 to 30. In accordance with ITU-T Rec. H.221, the FAS, BAS, and ECS channels of the frame structure are not encrypted. 3) Confidentiality is given to all user audio, video and data transmissions, these signals being encrypted together under the same key (this currently includes M

28、LP data, according to Annex A/H.221, though this aspect is for further study). 4) The system is independent of the encryption algorithm used; some algorithms are currently provided for, and further algorithms could be added. 5) The confidentiality mechanism is capable of working in point-to-point ca

29、lls, and also in multipoint calls where decryption is permitted at the MCU (the so-called “trusted MCU“). 4.2 Algorithm specification The specification of algorithms is not included in this Recommendation, which caters to a wide range of encryption algorithms. The specifications may be defined in An

30、nex A, or shall be available elsewhere (see 5.2) and shall contain the following details: lengths of initialization vector and session keys; generation of starting variable from initialization vector. 5 The confidentiality mechanism 5.1 Description of operation Figure 1 gives a block diagram of a li

31、nk encryptor. It consists of an encryptor block and a decryptor block. The encryptor takes in user data and enciphers it to form enciphered data. The decryptor takes enciphered data and deciphers it to obtain user data. ITU-T Rec. H.233 (11/2002) 3 Two channels are needed to connect the encryptor an

32、d decryptor. One is used to transmit the enciphered user data. The second is an unenciphered channel known as the Encryption Control Signal (ECS) which is used to pass control information from the encryptor to the decryptor. Although these two channels are shown physically separated, in practice, th

33、ey are multiplexed into a single frame structure as shown in ITU-T Rec. H.221. Additive-stream encipherment techniques are used (see 5.2). Keys are provided by other mechanisms and are presented to the confidentiality mechanism as required. They are used by the encryptor and decryptor synchronously

34、with the data, the key-loading synchronization flag being sent via the control channel (see L in 5.1.3). Data encipherment is controlled from the encryptor: the encryption ON/OFF flag is sent via the control channel to indicate when data is being enciphered. The decryptor responds to this flag and d

35、eciphers data when requested. H.233_F01Sender Transmission channel ReceiverKeys KeysUser dataRecovereduser dataEncryptor DecryptorEncyphered datachannelPlain data control channelInitialization vectorsFigure 1/H.233 Block diagram of a link encryptor 5.1.1 Controls and indication within the H.221 fram

36、e To indicate the presence of a confidentiality system within a terminal the BAS code “Encryption capability“ shall be transmitted. If this capability is signalled from both ends of a link, the Encryption Control Signal (ECS) channel may be opened in each direction by use of the encrypt-on BAS comma

37、nd; the ECS channel may be closed using the command encrypt-off, but this shall be preceded by the transmission of the encryption-off flag within the channel itself (see below). If a terminal receives the BAS command encrypt-off without first receiving the encryption-off flag, the user shall be aler

38、ted to a possible intrusion or malfunction of the confidentiality system. In cases where an H.221-framed signal is in use in one direction only, the ECS channel may be activated without use of the capability mechanism: the mechanism to ensure that the receiving end is able to decrypt the chosen algo

39、rithm, etc., is outside the scope of this Recommendation. 5.1.2 Message formats The messages used by the encryption system for key distribution and authentication are formatted in a nested ILC (Identifier, Length, Content) form as described in ITU-T Rec. X.680 4. The length may be encoded in short f

40、orm or long form. The indefinite form as defined in 4 will not be used. A short description of some of the ITU-T Rec. X.680 4 definitions used within this Recommendation is given below. 4 ITU-T Rec. H.233 (11/2002) 5.1.2.1 Identifier An identifier is an octet with the structure shown next. MSB LSB c

41、cpttttt c Tag class p Primitive/constructor (0/1) t Tag The tag class defines the type of identifier and takes a value of 10 or 11 (context specific). The primitive/constructor (P) bit indicates whether the content is primitive or whether it is composed of nested elements. The 5-bit tag uniquely def

42、ines the identifier (according to its class). Thus, all identifiers in this Recommendation have the octet form: 10 P t1t2t3t4t5or 11 P t1t2t3t4t5. 5.1.2.2 Length The length specifies the length in octets of the contents and is itself variable in length. The short form is one octet long and shall be

43、used in preference to the long form when L is less than 128. Bit 8 has the value zero and bits 7-1 encode L as an unsigned binary number whose MSB and LSB are bit 7 and bit 1, respectively. The Long form is from 2 to 127 octets long and is used when L is greater than, or equal to, 128 and less than

44、2 to the power 1008. Bit 8 of the first octet has the value one. Bits 7-1 of the first octet encode a number one less than the size of the length in octets as an unsigned binary number whose MSB and LSB are bit 7 and bit 1, respectively. L itself is encoded as an unsigned binary number whose MSB and

45、 LSB are bit 8 of the second octet and bit 1 of the last octet, respectively. This binary number shall be encoded in the fewest possible octets, with no leading octets containing the value 0. 5.1.2.3 Bit string A bit string in primitive form has the bits packed eight to an octet and preceded by an o

46、ctet that encodes the number of unused bits in the final octet of the contents, from zero to seven, as an unsigned binary number those MSB and LSB are bit 8 and bit 1, respectively. 5.1.3 Unenciphered ECS channel The confidentiality system requires the use of an unenciphered control channel between

47、encryptor and decryptor. Only one control channel per link encryption system is required. The same control channel is used in association with the encryption of the audio, video and any data that may be present. The content of the ECS channel is structured in blocks of 128 bits, synchronous with the

48、 H.221 multiframe (see Figure 2); thus the first bit of the block is bit 8 of octet 17 of frame number 0 in a multiframe. There are two types of block: Session Exchange (SE) and Initialization Vector (IV). The information contained within an IV block takes effect from the start of the next multifram

49、e, and remains effective until another IV has been sent. The ECS channel shall always contain either an IV block or an SE block. It shall be noted that according to some algorithm definitions the same IV may be loaded repeatedly; the choice as to whether or not to do this would be based on the trade-off between faster recovery from errors and additional security. ITU-T Rec. H.233 (11/2002) 5 Bit No. 0 1 2 3 4 5 6 7 8 9 10 11 | 12-119 | 120-127 SE Type 0 n n s s s s s e e e e | message | spare Bit No. 0 1 2 3 4 5 6 7 8 9 10 11 | 12-1

展开阅读全文
相关资源
猜你喜欢
  • DIN EN 2155-5-1989 Aerospace series test methods for transparent materials for aircraft glazing part 5 determination of visible light transmission german version EN 2155-5 1989《航空航.pdf DIN EN 2155-5-1989 Aerospace series test methods for transparent materials for aircraft glazing part 5 determination of visible light transmission german version EN 2155-5 1989《航空航.pdf
  • DIN EN 2155-7-1997 Aerospace series - Test methods for transparent materials for aircraft glazing - Part 7 Determination of optical deviation German version EN 2155-7 1997《航空航天系列 飞.pdf DIN EN 2155-7-1997 Aerospace series - Test methods for transparent materials for aircraft glazing - Part 7 Determination of optical deviation German version EN 2155-7 1997《航空航天系列 飞.pdf
  • DIN EN 2155-8-1989 Aerospace series test methods for transparent materials for aircraft glazing part 8 determination of optical distortion german version EN 2155-8 1989《航空航天系列 飞行器上.pdf DIN EN 2155-8-1989 Aerospace series test methods for transparent materials for aircraft glazing part 8 determination of optical distortion german version EN 2155-8 1989《航空航天系列 飞行器上.pdf
  • DIN EN 2155-9-1989 Aerospace series test methods for transparent materials for aircraft glazing part 9 determination of haze german version EN 2155-9 1989《航空航天系列 飞行器上窗玻璃用透明材料的试验方法 .pdf DIN EN 2155-9-1989 Aerospace series test methods for transparent materials for aircraft glazing part 9 determination of haze german version EN 2155-9 1989《航空航天系列 飞行器上窗玻璃用透明材料的试验方法 .pdf
  • DIN EN 2157-1-1993 Aerospace series steel forging stock and forgings technical specifications part 1 general requirements German version EN 2157-1 1993《航空航天 钢 锻坯和锻件 技术规范 第1部分 一般要求》.pdf DIN EN 2157-1-1993 Aerospace series steel forging stock and forgings technical specifications part 1 general requirements German version EN 2157-1 1993《航空航天 钢 锻坯和锻件 技术规范 第1部分 一般要求》.pdf
  • DIN EN 2157-2-1993 Aerospace series steel forging stock and forgings technical specification part 2 forging stock German version EN 2157-2 1993《航空航天 钢 锻坯和锻件 技术规范 第2部分 锻坯》.pdf DIN EN 2157-2-1993 Aerospace series steel forging stock and forgings technical specification part 2 forging stock German version EN 2157-2 1993《航空航天 钢 锻坯和锻件 技术规范 第2部分 锻坯》.pdf
  • DIN EN 2157-3-1993 Aerospace series steel forging stock and forgings technical specification part 3 pre-production and production forgings German version EN 2157-3 1993《航空航天 钢 锻坯和锻.pdf DIN EN 2157-3-1993 Aerospace series steel forging stock and forgings technical specification part 3 pre-production and production forgings German version EN 2157-3 1993《航空航天 钢 锻坯和锻.pdf
  • DIN EN 2205-2009 Aerospace series - Steel FE-PL1502 (25CrMo4) - 900 MPa R 1100 MPa - Bars - D 40 mm German and English version EN 2205 2009《航空航天系列 钢FE-PL1502(25CrMo4) 900 MPa≤Rm≤11.pdf DIN EN 2205-2009 Aerospace series - Steel FE-PL1502 (25CrMo4) - 900 MPa R 1100 MPa - Bars - D 40 mm German and English version EN 2205 2009《航空航天系列 钢FE-PL1502(25CrMo4) 900 MPa≤Rm≤11.pdf
  • DIN EN 2206-2009 Aerospace series - Steel FE-PL1502 (25CrMo4) - 650 MPa R 850 MPa - Bars - D 150 mm German and English version EN 2206 2008《航空航天系列 FE-PL1502(25CrMo4)型钢 650MPa≤Rm≤85.pdf DIN EN 2206-2009 Aerospace series - Steel FE-PL1502 (25CrMo4) - 650 MPa R 850 MPa - Bars - D 150 mm German and English version EN 2206 2008《航空航天系列 FE-PL1502(25CrMo4)型钢 650MPa≤Rm≤85.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1