1 / 15

WP 3 -- Security Technology And Multimedia Delivery

WP 3 -- Security Technology And Multimedia Delivery. Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf. Security Aspects. Intellectual Property Rights Value of Information Authentication And Key Exchange Data Administration: Security & Protection Data Delivery. value.

mateo
Télécharger la présentation

WP 3 -- Security Technology And Multimedia Delivery

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf 1 WP3 Presentation, ETH

  2. Security Aspects • Intellectual Property Rights • Value of Information • Authentication And Key Exchange • Data Administration: Security & Protection • Data Delivery 2 WP3 Presentation, ETH

  3. value value of information time value value of information time value value of information time Value of Information Definition of applied security. value value of information time 3 WP3 Presentation, ETH

  4. Authentication And Key Exchange • Symmetric Encryption • Kerberos 5, IETF Standard, arbitrated protocol (trusted keyserver) • Asymmetric Encryption • DASS, DEC, arbitrated protocol with public keys of users. 4 WP3 Presentation, ETH

  5. Data Administration: Security & Protection • Administration • per university in a decentralized platform • per project in a centralized platform • Data Protection • user data: privacy, small amount of data, high security-level  strong encryption (IDEA) • lecture data: public but w. IPR, huge amount of data, low security-level  weak encryption (DES) 5 WP3 Presentation, ETH

  6. Data Delivery • Secured network infrastructure • network-access restrictions • inter-university  intra-university • Insecure network (e.g. Internet) • user authentication and validation 6 WP3 Presentation, ETH

  7. Data Delivery -- Encryption • multimedia data encryption • partial encryption  protocol dependency, high speed. • full encryption  protocol independency, low speed Which is the encrypting Layer ? 7 WP3 Presentation, ETH

  8. Cryptography in Universal • Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys. • Hierarchical authentication scheme: • ISO: X.509 • Kerberos v. 5 • PGP 8 WP3 Presentation, ETH

  9. Cryptography in Universal • Obscuring technology (partial encryption) for audio/video data. • Full encryption for static teaching aids. • Algorithms according to the requirements,see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting 9 WP3 Presentation, ETH

  10. this page is itentionally left blank 10 WP3 Presentation, ETH

  11. Multimedia Data DeliveryProcessing speed • Timely limited usability • Full encryption vs. partial encryption • Strong vs. weak encryption 11 WP3 Presentation, ETH

  12. Cryptography • Symmetric: • identical key for encryption and decryption • DES, 3DES, IDEA, CAST, RCx, Blowfish • advantage: fast en/decrypting of data, implementation available in hard- and software • disadvantage: key must be known to all participants 12 WP3 Presentation, ETH

  13. Cryptography • Asymmetric: • public- and private-key to encrypt and decrypt • RSA, ElGamal, Rabin • advantage: different keys for encryption and decryption. • disadvantage: very slow 13 WP3 Presentation, ETH

  14. Key Exchange • Required to distribute encryption keys • Approaches: • Centralized: Trusted Keyserver • stores locally all keys • generates session keys upon request • must be contacted for every session • Decentralized:Public-Key-Infrastructure (PKI)(e.g. PGP’s Web of Trust) 14 WP3 Presentation, ETH

  15. Intellectual Property Rights (IPR) • Protection schemes • anti-replay • timed validity/usability • digital watermarks, digital signatures • Scope of IPR application • Scope of data distribution 15 WP3 Presentation, ETH

More Related