SlideShare a Scribd company logo
Secure multicast conferencing Peter Kirstein, Ian Brown and Edmund Whelan University College London IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL
Video IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Multicast conferencing involves... Audio Shared whiteboard
Confidentiality: only authorised conference members can access conference data Integrity: you can be sure data has not been altered in transit Authentication: of conference announcers and participants IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Security provides...
Each link is secured using a standard communications security protocol: IPSEC, SSL/TLS, SSH Extremely wasteful of bandwidth Multipoint control units are security risks IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Point-to-point conferencing security is easy...
Multicast doesn’t fit the “point-to-point” model of current security protocols There is no standard method of sharing keys between group members IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL But multicast is more tricky...
Use Real-time Transport Protocol (RTP) to send data Users announce conferences and invite users by sending a session invitation via e-mail, the Session Announcement or Session Invitation Protocols  IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Insecure conferences
RTP allows data to be encrypted with DES - implemented in UCL’s tools We want to move to IPSEC to remove need for cryptographic code in applications and take advantage of its wide range of ciphersuites and protocol and implementation security IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Secure transport
Now standardised by IETF (RFC 2411) Provides network-layer protection for all packets sent between compatible machines Not yet finished for multicast IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL IP security extensions
The Internet Key Exchange (IKE) allows two hosts to negotiate security parameters for an IPSEC connection But multicast IKE is much harder, and being investigated by the IRTF IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Key distribution problem
We use secure session invitations to distribute security parameters Sent using secure SAP, SIP, or e-mail (S/MIME) or retrieved via the World Wide Web (TLS) IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Conferencing solution
Session descriptions are stored on a secure Web server Authorised conference members can retrieve descriptions over a TLS link IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Web distribution
Users don’t like having to remember many long passphrases Mobile users need access to keys from many different systems Software keys are vulnerable to theft Smartcards alleviate all these problems IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Smartcards
In-network code can reduce bandwidth requirements, convert between coding schemes, provide multicast connectivity, etc. etc. IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Active services
You can give proxies the session keys needed for them to access and process data We are developing proxies that can work without this security risk IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Processing encrypted data
Multicast conference data can be secured at the network or application layer Until multicast key distribution is standardised, lightweight methods based on session descriptions can be used New techniques are needed to allow in-network processing of encrypted data IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Conclusions

More Related Content

PDF
Network Security Applications
PPTX
Presentation network security
PDF
Wi-Fi security – WEP, WPA and WPA2
PPTX
Wireless security using wpa2
PPTX
Wireless network security
PPT
Lesson 2 Cryptography tools
PPT
Wi fi protected-access
Network Security Applications
Presentation network security
Wi-Fi security – WEP, WPA and WPA2
Wireless security using wpa2
Wireless network security
Lesson 2 Cryptography tools
Wi fi protected-access

What's hot (20)

PPTX
PPTX
Wireless Network security
PPT
Ch06 Wireless Network Security
PDF
Computer Security - CCNA Security - Lecture 1
PDF
CipherLoc_OverviewBrochure (1)
PPTX
JDMDE Specialisation KaHo Sint-Lieven
PPS
Iuwne10 S04 L05
PPTX
Wpa vs Wpa2
PPTX
Wi Fi Security
PPTX
Network security
PPTX
802.11 Wireless, WEP, WPA lecture
PDF
Pentesting Wireless Networks and Wireless Network Security
PPTX
Wifi Security
PPT
Ch32
PDF
8 Authentication Security Protocols
PPTX
WPA 3
PPTX
Network security
PPT
Wifi Security
PPTX
Wpa2 psk security measure
Wireless Network security
Ch06 Wireless Network Security
Computer Security - CCNA Security - Lecture 1
CipherLoc_OverviewBrochure (1)
JDMDE Specialisation KaHo Sint-Lieven
Iuwne10 S04 L05
Wpa vs Wpa2
Wi Fi Security
Network security
802.11 Wireless, WEP, WPA lecture
Pentesting Wireless Networks and Wireless Network Security
Wifi Security
Ch32
8 Authentication Security Protocols
WPA 3
Network security
Wifi Security
Wpa2 psk security measure
Ad

Similar to Secure Multicast Conferencing (20)

PDF
CDE Marketplace: SQR Systems
PPTX
fundamental of network security
PPT
Security in bluetooth, cdma and umts
PPT
Security in bluetooth, cdma and umts
PDF
Internet Protocol Security as the Network Cryptography System
PPT
Download
PPT
Download
PPTX
Asymmetric Cryptography-Public key Cryptosystems3lecture_topic_pkc_unit2.pptx
PDF
day2_research_200-250.pdfday2_research_200-250.pdfday2_research_200-250.pdf
PDF
Virtual private networks
PDF
8th International Conference on Networks and Security (NSEC 2024)
PPT
saag-3.ppt
PDF
Cns unit4
PDF
Cns unit4
PDF
Virtual private network a veritable tool for network security
PPTX
CRYPTOGRAPHY & NETWORK SECURITY.pptx
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PDF
12th International Conference on Communications Security & Information Assura...
PDF
Lan Virtual Networks
CDE Marketplace: SQR Systems
fundamental of network security
Security in bluetooth, cdma and umts
Security in bluetooth, cdma and umts
Internet Protocol Security as the Network Cryptography System
Download
Download
Asymmetric Cryptography-Public key Cryptosystems3lecture_topic_pkc_unit2.pptx
day2_research_200-250.pdfday2_research_200-250.pdfday2_research_200-250.pdf
Virtual private networks
8th International Conference on Networks and Security (NSEC 2024)
saag-3.ppt
Cns unit4
Cns unit4
Virtual private network a veritable tool for network security
CRYPTOGRAPHY & NETWORK SECURITY.pptx
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
12th International Conference on Communications Security & Information Assura...
Lan Virtual Networks
Ad

More from blogzilla (20)

PDF
Interoperability for SNS competition
PPTX
Transatlantic data flows following the Schrems II judgment
PPTX
Lessons for interoperability remedies from UK Open Banking
PPTX
Covid exposure apps in England and Wales
PPTX
Key issues in data protection policy
PPTX
Trusted government access to private sector data
PDF
Interoperability in the Digital Services Act
PPTX
Making effective policy use of academic expertise
PPTX
Introduction to Cybersecurity for Elections
PPTX
Cyber Essentials for Managers
PDF
Privacy and Data Protection in South Africa
PPTX
Human rights and the future of surveillance - Lord Anderson QC
PDF
Data science and privacy regulation
PPTX
Where next for encryption regulation?
PPTX
Where next for the Regulation of Investigatory Powers Act?
PPTX
Regulation and the Internet of Things
PPTX
Global Cyber Security Capacity Centre
PPTX
Privacy post-Snowden
PPTX
Keeping our secrets? Shaping Internet technologies for the public good
PPT
The Data Retention Directive: recent developments
Interoperability for SNS competition
Transatlantic data flows following the Schrems II judgment
Lessons for interoperability remedies from UK Open Banking
Covid exposure apps in England and Wales
Key issues in data protection policy
Trusted government access to private sector data
Interoperability in the Digital Services Act
Making effective policy use of academic expertise
Introduction to Cybersecurity for Elections
Cyber Essentials for Managers
Privacy and Data Protection in South Africa
Human rights and the future of surveillance - Lord Anderson QC
Data science and privacy regulation
Where next for encryption regulation?
Where next for the Regulation of Investigatory Powers Act?
Regulation and the Internet of Things
Global Cyber Security Capacity Centre
Privacy post-Snowden
Keeping our secrets? Shaping Internet technologies for the public good
The Data Retention Directive: recent developments

Recently uploaded (20)

PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PPTX
sales presentation، Training Overview.pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Cours de Système d'information about ERP.pdf
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Introduction to Generative Engine Optimization (GEO)
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
PPTX
operations management : demand supply ch
PDF
Technical Architecture - Chainsys dataZap
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Solaris Resources Presentation - Corporate August 2025.pdf
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
sales presentation، Training Overview.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Booking.com The Global AI Sentiment Report 2025
Cours de Système d'information about ERP.pdf
Lecture 3344;;,,(,(((((((((((((((((((((((
Introduction to Generative Engine Optimization (GEO)
Comments on Crystal Cloud and Energy Star.pdf
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Slide gioi thieu VietinBank Quy 2 - 2025
Module 2 - Modern Supervison Challenges - Student Resource.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Building a Smart Pet Ecosystem: A Full Introduction to Zhejiang Beijing Techn...
operations management : demand supply ch
Technical Architecture - Chainsys dataZap
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx

Secure Multicast Conferencing

  • 1. Secure multicast conferencing Peter Kirstein, Ian Brown and Edmund Whelan University College London IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL
  • 2. Video IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Multicast conferencing involves... Audio Shared whiteboard
  • 3. Confidentiality: only authorised conference members can access conference data Integrity: you can be sure data has not been altered in transit Authentication: of conference announcers and participants IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Security provides...
  • 4. Each link is secured using a standard communications security protocol: IPSEC, SSL/TLS, SSH Extremely wasteful of bandwidth Multipoint control units are security risks IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Point-to-point conferencing security is easy...
  • 5. Multicast doesn’t fit the “point-to-point” model of current security protocols There is no standard method of sharing keys between group members IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL But multicast is more tricky...
  • 6. Use Real-time Transport Protocol (RTP) to send data Users announce conferences and invite users by sending a session invitation via e-mail, the Session Announcement or Session Invitation Protocols IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Insecure conferences
  • 7. RTP allows data to be encrypted with DES - implemented in UCL’s tools We want to move to IPSEC to remove need for cryptographic code in applications and take advantage of its wide range of ciphersuites and protocol and implementation security IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Secure transport
  • 8. Now standardised by IETF (RFC 2411) Provides network-layer protection for all packets sent between compatible machines Not yet finished for multicast IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL IP security extensions
  • 9. The Internet Key Exchange (IKE) allows two hosts to negotiate security parameters for an IPSEC connection But multicast IKE is much harder, and being investigated by the IRTF IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Key distribution problem
  • 10. We use secure session invitations to distribute security parameters Sent using secure SAP, SIP, or e-mail (S/MIME) or retrieved via the World Wide Web (TLS) IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Conferencing solution
  • 11. Session descriptions are stored on a secure Web server Authorised conference members can retrieve descriptions over a TLS link IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Web distribution
  • 12. Users don’t like having to remember many long passphrases Mobile users need access to keys from many different systems Software keys are vulnerable to theft Smartcards alleviate all these problems IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Smartcards
  • 13. In-network code can reduce bandwidth requirements, convert between coding schemes, provide multicast connectivity, etc. etc. IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Active services
  • 14. You can give proxies the session keys needed for them to access and process data We are developing proxies that can work without this security risk IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Processing encrypted data
  • 15. Multicast conference data can be secured at the network or application layer Until multicast key distribution is standardised, lightweight methods based on session descriptions can be used New techniques are needed to allow in-network processing of encrypted data IDC’99, Madrid 23 Sept. 1999 Ian Brown, UCL Conclusions

Editor's Notes