150 likes | 257 Views
WP 3 -- Security Technology And Multimedia Delivery. Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf. Security Aspects. Intellectual Property Rights Value of Information Authentication And Key Exchange Data Administration: Security & Protection Data Delivery. value.
E N D
WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory, ETH Zurich Lukas Ruf 1 WP3 Presentation, ETH
Security Aspects • Intellectual Property Rights • Value of Information • Authentication And Key Exchange • Data Administration: Security & Protection • Data Delivery 2 WP3 Presentation, ETH
value value of information time value value of information time value value of information time Value of Information Definition of applied security. value value of information time 3 WP3 Presentation, ETH
Authentication And Key Exchange • Symmetric Encryption • Kerberos 5, IETF Standard, arbitrated protocol (trusted keyserver) • Asymmetric Encryption • DASS, DEC, arbitrated protocol with public keys of users. 4 WP3 Presentation, ETH
Data Administration: Security & Protection • Administration • per university in a decentralized platform • per project in a centralized platform • Data Protection • user data: privacy, small amount of data, high security-level strong encryption (IDEA) • lecture data: public but w. IPR, huge amount of data, low security-level weak encryption (DES) 5 WP3 Presentation, ETH
Data Delivery • Secured network infrastructure • network-access restrictions • inter-university intra-university • Insecure network (e.g. Internet) • user authentication and validation 6 WP3 Presentation, ETH
Data Delivery -- Encryption • multimedia data encryption • partial encryption protocol dependency, high speed. • full encryption protocol independency, low speed Which is the encrypting Layer ? 7 WP3 Presentation, ETH
Cryptography in Universal • Temporary valid session keys for symmetrical encryption based on an asymmetrical encryption keys. • Hierarchical authentication scheme: • ISO: X.509 • Kerberos v. 5 • PGP 8 WP3 Presentation, ETH
Cryptography in Universal • Obscuring technology (partial encryption) for audio/video data. • Full encryption for static teaching aids. • Algorithms according to the requirements,see presentation Security Techniques for IPR by T. Klobucar at WP1-Meeting 9 WP3 Presentation, ETH
this page is itentionally left blank 10 WP3 Presentation, ETH
Multimedia Data DeliveryProcessing speed • Timely limited usability • Full encryption vs. partial encryption • Strong vs. weak encryption 11 WP3 Presentation, ETH
Cryptography • Symmetric: • identical key for encryption and decryption • DES, 3DES, IDEA, CAST, RCx, Blowfish • advantage: fast en/decrypting of data, implementation available in hard- and software • disadvantage: key must be known to all participants 12 WP3 Presentation, ETH
Cryptography • Asymmetric: • public- and private-key to encrypt and decrypt • RSA, ElGamal, Rabin • advantage: different keys for encryption and decryption. • disadvantage: very slow 13 WP3 Presentation, ETH
Key Exchange • Required to distribute encryption keys • Approaches: • Centralized: Trusted Keyserver • stores locally all keys • generates session keys upon request • must be contacted for every session • Decentralized:Public-Key-Infrastructure (PKI)(e.g. PGP’s Web of Trust) 14 WP3 Presentation, ETH
Intellectual Property Rights (IPR) • Protection schemes • anti-replay • timed validity/usability • digital watermarks, digital signatures • Scope of IPR application • Scope of data distribution 15 WP3 Presentation, ETH