Advertisement

Scalable security mechanisms in transport systems for enhanced multimedia services

  • T. Kunkelmann
  • H. Vogler
  • M. -L. Moschgath
  • L. Wolf
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1425)

Abstract

Data confidentiality is a very important issue for communication in open networks. Secure communication usually will be achieved by encryption mechanisms. For distributed multimedia applications the usage of encryption in real-time can cause a performance problem due to the time complexity of the cryptographic algorithms. In these cases partial encryption is a solution to satisfy real-time demands.

In this paper we examine the usage of partial encryption in transport systems for multimedia data. This implies that the partial encryption scheme cannot take advantage of special properties of the multimedia data content. So we first demonstrate that in most cases it is sufficient to encrypt only a small portion of randomly chosen data from a video stream to achieve an adequate level of security.

There are different approaches to integrate partial encryption mechanisms in transport systems. As a first approach, we investigate the integration in the transport layer. This offers several facilities for the integration. An alternative approach is located in the network layer, where alternative routing methods for a multimedia data stream are analyzed. A discussion of the impact of partial encryption to transport system mechanisms concludes this paper.

Keywords

Data Stream Video Stream Forward Error Correction Stream Cipher Encrypt Data 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    J. Meyer, F. Gadegast: Security mechanisms for Multimedia Data with the Example MPEG-1-Video. http://www.powerweb.de/mpeg/doc/seemeng.ps.gz, 1995Google Scholar
  2. [2]
    B. Schneier: Applied Cryptography. 2nd Edition, ISBN 0-471-11709-9, John Wiley, New York, 1996Google Scholar
  3. [3]
    National Bureau of Standards: Data Encryption Standard. FIPS 46, Government Printing Service, 1977Google Scholar
  4. [4]
    X. Lai: On the Design and Security of Block Ciphers. ETH Series in Information Processing, 1, H. Gone Verlag, Konstanz, 1992Google Scholar
  5. [5]
    W. Diffie, M.E. Hellmann: New Directions in Cryptography. IEEE Transactions on Information Theory, 6, pp. 644–654, 1976Google Scholar
  6. [6]
    R. Rivest, A. Shamir, L. Adleman: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 21(2), pp. 120–126, 1978Google Scholar
  7. [7]
    T. Ylönen: The SSH (Secure Shell) Remote Login Protocol. http://www.cs.hut.filssh/RFC, 1995Google Scholar
  8. [8]
    A.O. Freier, P. Karhon, P.C. Kocher: The SSL Protocol Version 3.0. ftp://ietf.org/intemet-drafts/draft-ietf-tls-ssl-version3-OO.txt, 1996Google Scholar
  9. [9]
    H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson: RTP:: A Transport Protocol for Real-Time Applications. RFC 1889, 1996Google Scholar
  10. [10]
    T. Aalto: IPv6 Authentication Header and Encapsulated Security Payload. http://www.tcm.hut.fi/Opinnot/Tik-110.551/1996/ahesp.html, 1996Google Scholar
  11. [11]
    ATM Forum: Phase I ATM Security Specification (3rd Draft). ATM Forum BTD-SEC-01.03, 1997Google Scholar
  12. [12]
    J. Gray, A. Kshemkalyani, M. Matyas et al.: ATM Cell Encryption and Key Update Synchronization. Telecommunication Systems Journal, Vol. 7(4), pp. 391–408, 1997Google Scholar
  13. [13]
    ISO/IEC International Standard 10918: Digital Compression and Coding of Continuous-Tone Still Images. 1993Google Scholar
  14. [14]
    W. Namgoong, N. Chaddha, T.H.Y. Meng: Low-Power Video Encoder/Decoder Using Wavelet/TSVQ With Conditional Replenishment. Proc.ICASSP'96, Atlanta, GA, 1996Google Scholar
  15. [15]
    ISO/IEC International Standard 11172: Coding of Moving Pictures and Associated Audio for Digital Storage Media up to about 1.5 Mbit/s. 1993Google Scholar
  16. [16]
    ITU-T Recommendation H.263: Video coding for low bit rate communication. 1996Google Scholar
  17. [17]
    Ron Frederic: Experiences with real-time software video compression. XEROX Pare, ftp://ftp.parc.xerox.com/pub/net-research/nv-paper.ps, 1994Google Scholar
  18. [18]
    P. Bahl, P.S. Gauthier, R.A. Ulichney: Software-only Compression, Rendering, and Playback of Digital Video. Digital Technical Journal Vol. 7(4), 1995Google Scholar
  19. [19]
    German National Research Center for Information Technology (GMD): SECUDE — A General Purpose Security Toolkit. http://www.secude.com/, 1996Google Scholar
  20. [20]
    K. Patel, B.C. Smith, L.A. Rowe: Performance of a Software MPEG Video Decoder. Proc. ACM Multimedia, Anaheim, CA, 1993Google Scholar
  21. [21]
    C.E. Shannon: Communication Theory of Secret Systems. Bell System Technical Journal, Vol 28(4), pp. 656–715, 1948Google Scholar
  22. [22]
    T. Kunkelmann, R. Reinema, R. Steinmetz, T. Blecher: Evaluation of Different Video Encryption Methods for a Secure Multimedia Gateway. Proc. 4th COST 237 Workshop, Lisboa, Portugal, Springer Verlag, LNCS 1356, December 1997Google Scholar
  23. [23]
    D. Y. Pan: Digital Audio compression. Digital Technical Journal Vol. 5(2), 1993Google Scholar
  24. [24]
    T. Kunkelmann, R. Reinema: A Scalable Security Architecture for Multimedia Communication Standards. Proc. 4th IEEE Int'l Conference on Multimedia Computing and Systems, Ottawa, Canada, 1997Google Scholar
  25. [25]
    L. Tang: Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Proc. 4th ACM International Multimedia Conference, Boston, MA, 1996Google Scholar
  26. [26]
    T. Dierks, C. Allen: The TLS Protocol Version 1.0. ftp://ietf.org./intemet-drafts/draft-ietf-tls-protocol-Ol.txt, 1996Google Scholar
  27. [27]
    L. Delgrossi, S. Schaller, L. Wolf: Relationships among Dependent Real-Time Streams. 12th Int'l Conference On Computer Communication, Seoul, Korea, 1995Google Scholar
  28. [28]
    H.Harney, C. Muckenhim: Group Key Management Protocol (GKMP) Architecture. ftp://ietf.org/intemet-drafts/draft-hamey-gkmp-arch-01.txt, 1996Google Scholar
  29. [29]
    S. Mittra: lotus: A Framework for Scalable Secure Multicasting. Proc. ACM SIGCOMM, Cannes, France, 1997Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • T. Kunkelmann
    • 1
  • H. Vogler
    • 1
  • M. -L. Moschgath
    • 1
  • L. Wolf
    • 2
  1. 1.Information Technology Transfer OfficeGermany
  2. 2.Institute for Industrial Process and System CommunicationDarmstadt University of TechnologyDarmstadtGermany

Personalised recommendations