150 likes | 263 Vues
This presentation outlines security technologies utilized in multimedia data delivery, focusing on intellectual property rights, encryption methods, and user authentication. It delves into the value of information, asymmetric and symmetric encryption mechanisms like RSA and DES, and the importance of secure data administration. With a focus on inter- and intra-university data sharing, the presentation details both decentralized and centralized platforms, data privacy considerations, and effective key exchange protocols. Challenges of encryption in multimedia and its impact on processing speed are also examined.
E N D
WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf 1 WP3 Presentation, ETH
Security Aspects • Intellectual Property Rights • Value of Information • Authentication And Key Exchange • Data Administration: Security & Protection • Data Delivery 2 WP3 Presentation, ETH
value value of information time value value of information time value value of information time Value of Information Definition of applied security. value value of information time 3 WP3 Presentation, ETH
Authentication And Key Exchange • Symmetric Encryption • Kerberos 5, IETF Standard, arbitrated protocol (trusted keyserver) • Asymmetric Encryption • DASS, DEC, arbitrated protocol with public keys of users. 4 WP3 Presentation, ETH
Data Administration: Security & Protection • Administration • per university in a decentralized platform • per project in a centralized platform • Data Protection • user data: privacy, small amount of data, high security-level strong encryption (IDEA) • lecture data: public but w. IPR, huge amount of data, low security-level weak encryption (DES) 5 WP3 Presentation, ETH
Data Delivery • Secured network infrastructure • network-access restrictions • inter-university intra-university • Insecure network (e.g. Internet) • user authentication and validation 6 WP3 Presentation, ETH
Data Delivery -- Encryption • multimedia data encryption • partial encryption protocol dependency, high speed. • full encryption protocol independency, low speed Which is the encrypting Layer ? 7 WP3 Presentation, ETH
Cryptography in Universal • Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys. • Hierarchical authentication scheme: • ISO: X.509 • Kerberos v. 5 • PGP 8 WP3 Presentation, ETH
Cryptography in Universal • Obscuring technology (partial encryption) for audio/video data. • Full encryption for static teaching aids. • Algorithms according to the requirements,see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting 9 WP3 Presentation, ETH
this page is itentionally left blank 10 WP3 Presentation, ETH
Multimedia Data DeliveryProcessing speed • Timely limited usability • Full encryption vs. partial encryption • Strong vs. weak encryption 11 WP3 Presentation, ETH
Cryptography • Symmetric: • identical key for encryption and decryption • DES, 3DES, IDEA, CAST, RCx, Blowfish • advantage: fast en/decrypting of data, implementation available in hard- and software • disadvantage: key must be known to all participants 12 WP3 Presentation, ETH
Cryptography • Asymmetric: • public- and private-key to encrypt and decrypt • RSA, ElGamal, Rabin • advantage: different keys for encryption and decryption. • disadvantage: very slow 13 WP3 Presentation, ETH
Key Exchange • Required to distribute encryption keys • Approaches: • Centralized: Trusted Keyserver • stores locally all keys • generates session keys upon request • must be contacted for every session • Decentralized:Public-Key-Infrastructure (PKI)(e.g. PGP’s Web of Trust) 14 WP3 Presentation, ETH
Intellectual Property Rights (IPR) • Protection schemes • anti-replay • timed validity/usability • digital watermarks, digital signatures • Scope of IPR application • Scope of data distribution 15 WP3 Presentation, ETH