Abstract
Data confidentiality is a very important issue for communication in open networks. Secure communication usually will be achieved by encryption mechanisms. For distributed multimedia applications the usage of encryption in real-time can cause a performance problem due to the time complexity of the cryptographic algorithms. In these cases partial encryption is a solution to satisfy real-time demands.
In this paper we examine the usage of partial encryption in transport systems for multimedia data. This implies that the partial encryption scheme cannot take advantage of special properties of the multimedia data content. So we first demonstrate that in most cases it is sufficient to encrypt only a small portion of randomly chosen data from a video stream to achieve an adequate level of security.
There are different approaches to integrate partial encryption mechanisms in transport systems. As a first approach, we investigate the integration in the transport layer. This offers several facilities for the integration. An alternative approach is located in the network layer, where alternative routing methods for a multimedia data stream are analyzed. A discussion of the impact of partial encryption to transport system mechanisms concludes this paper.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
J. Meyer, F. Gadegast: Security mechanisms for Multimedia Data with the Example MPEG-1-Video. http://www.powerweb.de/mpeg/doc/seemeng.ps.gz, 1995
B. Schneier: Applied Cryptography. 2nd Edition, ISBN 0-471-11709-9, John Wiley, New York, 1996
National Bureau of Standards: Data Encryption Standard. FIPS 46, Government Printing Service, 1977
X. Lai: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, H. Gone Verlag, Konstanz, 1992
W. Diffie, M.E. Hellmann: New Directions in Cryptography. IEEE Transactions on Information Theory, 6, pp. 644–654, 1976
R. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2), pp. 120–126, 1978
T. Ylönen: The SSH (Secure Shell) Remote Login Protocol. http://www.cs.hut.filssh/RFC, 1995
A.O. Freier, P. Karhon, P.C. Kocher: The SSL Protocol Version 3.0. ftp://ietf.org/intemet-drafts/draft-ietf-tls-ssl-version3-OO.txt, 1996
H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP:: A Transport Protocol for Real-Time Applications. RFC 1889, 1996
T. Aalto: IPv6 Authentication Header and Encapsulated Security Payload. http://www.tcm.hut.fi/Opinnot/Tik-110.551/1996/ahesp.html, 1996
ATM Forum: Phase I ATM Security Specification (3rd Draft). ATM Forum BTD-SEC-01.03, 1997
J. Gray, A. Kshemkalyani, M. Matyas et al.: ATM Cell Encryption and Key Update Synchronization. Telecommunication Systems Journal, Vol. 7(4), pp. 391–408, 1997
ISO/IEC International Standard 10918: Digital Compression and Coding of Continuous-Tone Still Images. 1993
W. Namgoong, N. Chaddha, T.H.Y. Meng: Low-Power Video Encoder/Decoder Using Wavelet/TSVQ With Conditional Replenishment. Proc.ICASSP'96, Atlanta, GA, 1996
ISO/IEC International Standard 11172: Coding of Moving Pictures and Associated Audio for Digital Storage Media up to about 1.5 Mbit/s. 1993
ITU-T Recommendation H.263: Video coding for low bit rate communication. 1996
Ron Frederic: Experiences with real-time software video compression. XEROX Pare, ftp://ftp.parc.xerox.com/pub/net-research/nv-paper.ps, 1994
P. Bahl, P.S. Gauthier, R.A. Ulichney: Software-only Compression, Rendering, and Playback of Digital Video. Digital Technical Journal Vol. 7(4), 1995
German National Research Center for Information Technology (GMD): SECUDE — A General Purpose Security Toolkit. http://www.secude.com/, 1996
K. Patel, B.C. Smith, L.A. Rowe: Performance of a Software MPEG Video Decoder. Proc. ACM Multimedia, Anaheim, CA, 1993
C.E. Shannon: Communication Theory of Secret Systems. Bell System Technical Journal, Vol 28(4), pp. 656–715, 1948
T. Kunkelmann, R. Reinema, R. Steinmetz, T. Blecher: Evaluation of Different Video Encryption Methods for a Secure Multimedia Gateway. Proc. 4th COST 237 Workshop, Lisboa, Portugal, Springer Verlag, LNCS 1356, December 1997
D. Y. Pan: Digital Audio compression. Digital Technical Journal Vol. 5(2), 1993
T. Kunkelmann, R. Reinema: A Scalable Security Architecture for Multimedia Communication Standards. Proc. 4th IEEE Int'l Conference on Multimedia Computing and Systems, Ottawa, Canada, 1997
L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. 4th ACM International Multimedia Conference, Boston, MA, 1996
T. Dierks, C. Allen: The TLS Protocol Version 1.0. ftp://ietf.org./intemet-drafts/draft-ietf-tls-protocol-Ol.txt, 1996
L. Delgrossi, S. Schaller, L. Wolf: Relationships among Dependent Real-Time Streams. 12th Int'l Conference On Computer Communication, Seoul, Korea, 1995
H.Harney, C. Muckenhim: Group Key Management Protocol (GKMP) Architecture. ftp://ietf.org/intemet-drafts/draft-hamey-gkmp-arch-01.txt, 1996
S. Mittra: lotus: A Framework for Scalable Secure Multicasting. Proc. ACM SIGCOMM, Cannes, France, 1997
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kunkelmann, T., Vogler, H., Moschgath, M.L., Wolf, L. (1998). Scalable security mechanisms in transport systems for enhanced multimedia services. In: Hutchison, D., Schäfer, R. (eds) Multimedia Applications, Services and Techniques — ECMAST'98. ECMAST 1998. Lecture Notes in Computer Science, vol 1425. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64594-2_96
Download citation
DOI: https://doi.org/10.1007/3-540-64594-2_96
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64594-8
Online ISBN: 978-3-540-69344-4
eBook Packages: Springer Book Archive