ITU-T H 235 5-2005 H 323 security Framework for secure authentication in RAS using weak shared secrets (Study Group 16)《H 323安全框架 在远程访问服务(RAS)中使用弱共享机密的安全认证框架 16号研究组》.pdf
《ITU-T H 235 5-2005 H 323 security Framework for secure authentication in RAS using weak shared secrets (Study Group 16)《H 323安全框架 在远程访问服务(RAS)中使用弱共享机密的安全认证框架 16号研究组》.pdf》由会员分享,可在线阅读,更多相关《ITU-T H 235 5-2005 H 323 security Framework for secure authentication in RAS using weak shared secrets (Study Group 16)《H 323安全框架 在远程访问服务(RAS)中使用弱共享机密的安全认证框架 16号研究组》.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、 International Telecommunication Union ITU-T H.235.5TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2005) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMSInfrastructure of audiovisual services Systems aspects H.323 security: Framework for secure authentication in RAS using weak shared secrets ITU-T
2、Recommendation H.235.5 ITU-T H-SERIES RECOMMENDATIONS AUDIOVISUAL AND MULTIMEDIA SYSTEMS CHARACTERISTICS OF VISUAL TELEPHONE SYSTEMS H.100H.199 INFRASTRUCTURE OF AUDIOVISUAL SERVICES General H.200H.219 Transmission multiplexing and synchronization H.220H.229 Systems aspects H.230H.239 Communication
3、procedures H.240H.259 Coding of moving video H.260H.279 Related systems aspects H.280H.299 Systems and terminal equipment for audiovisual services H.300H.349 Directory services architecture for audiovisual and multimedia services H.350H.359 Quality of service architecture for audiovisual and multime
4、dia services H.360H.369 Supplementary services for multimedia H.450H.499 MOBILITY AND COLLABORATION PROCEDURES Overview of Mobility and Collaboration, definitions, protocols and procedures H.500H.509 Mobility for H-Series multimedia systems and services H.510H.519 Mobile multimedia collaboration app
5、lications and services H.520H.529 Security for mobile multimedia systems and services H.530H.539 Security for mobile multimedia collaboration applications and services H.540H.549 Mobility interworking procedures H.550H.559Mobile multimedia collaboration inter-working procedures H.560H.569 BROADBAND
6、AND TRIPLE-PLAY MULTIMEDIA SERVICES Broadband multimedia services over VDSL H.610H.619 For further details, please refer to the list of ITU-T Recommendations. ITU-T Rec. H.235.5 (09/2005) i ITU-T Recommendation H.235.5 H.323 security: Framework for secure authentication in RAS using weak shared secr
7、ets Summary This Recommendation provides the framework for mutual party authentication during H.225.0 RAS exchanges. The “proof-of-possession“ methods described permit secure use of shared secrets such as passwords which, if used by themselves, would not provide sufficient security. Extensions to th
8、e framework to permit simultaneous negotiation of Transport Layer Security parameters for protection of a subsequent call signalling channel are also described. In earlier versions of the H.235 sub-series, this profile was contained in H.235 Annex H. Appendices IV, V, VI to H.235.0 show the complete
9、 clause, figure, and table mapping between H.235 versions 3 and 4. Source ITU-T Recommendation H.235.5 was approved on 13 September 2005 by ITU-T Study Group 16 (2005-2008) under the ITU-T Recommendation A.8 procedure. Keywords Authentication, passwords, security. ii ITU-T Rec. H.235.5 (09/2005) FOR
10、EWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and iss
11、uing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these to
12、pics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expressio
13、n “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability)
14、and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recomme
15、ndation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of c
16、laimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recomme
17、ndation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permiss
18、ion of ITU. ITU-T Rec. H.235.5 (09/2005) iii CONTENTS Page 1 Scope 1 2 References. 1 2.1 Normative references 1 2.2 Informative references 1 3 Definitions 2 4 Abbreviations 2 5 Conventions 3 6 Basic framework. 3 6.1 Improved negotiation capabilities in H.235.0 3 6.2 Use between endpoint and gatekeep
19、er . 3 6.3 Use of profile between gatekeepers 6 6.4 Signalling channel encryption and authentication 6 7 A specific security profile (SP1). 6 8 An improved security profile (SP2) 8 8.1 Call Signalling sequence number . 9 8.2 Generation of Weak Encryption Key from password 9 8.3 Nonce size 9 8.4 Init
20、ialization vector salting. 9 8.5 ClearToken encoding 10 9 Extensions to the framework (Informative) 10 9.1 Using the master key to secure the call signalling channel via TLS 10 9.2 Use of certificates to authenticate the gatekeeper 12 9.3 Use of alternative signalling security mechanisms 12 10 Threa
21、ts (Informative) 12 10.1 Passive attack 12 10.2 Denial-of-Service attacks . 12 10.3 Man-in-the-Middle attacks . 13 10.4 Guessing attacks . 13 10.5 Unencrypted gatekeeper half-key. 13 iv ITU-T Rec. H.235.5 (09/2005) Introduction In many applications, an endpoint (or its user) and its gatekeeper may s
22、hare only a “small“ secret such as a password or a “personal identification number“ (PIN). Such a secret (which we shall hereafter refer to as a “password“), and any encryption key derived from it, is cryptographically weak. The challenge/response authentication schemes, as described in clause 10, p
23、rovide samples of plaintext and corresponding ciphertext and are, therefore, subject to a brute-force attack by an observer of the transaction when the authentications are keyed by simple passwords. Thus, the observer may recover the password or PIN and later pose as the endpoint to obtain service.
24、A family of protocols under the generic heading of Encrypted Key Exchange use a shared secret to “obscure“ a Diffie-Hellman key exchange in such a way that the attacker must solve a series of finite logarithm problems in order to validate a brute-force attack against the shared secret. In the Encryp
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTH23552005H323SECURITYFRAMEWORKFORSECUREAUTHENTICATIONINRASUSINGWEAKSHAREDSECRETSSTUDYGROUP16H323

链接地址:http://www.mydoc123.com/p-797450.html