60 likes | 87 Views
Marcus Leech Nortel Networks. Security Requirements. Business-Driven Requirements. Theft of service Session authentication Message integrity/authentication Encryption (theft of subscription video, etc) Customer separation Encryption Message integrity Session authentication.
E N D
Marcus Leech Nortel Networks Security Requirements
Business-Driven Requirements • Theft of service • Session authentication • Message integrity/authentication • Encryption (theft of subscription video, etc) • Customer separation • Encryption • Message integrity • Session authentication
Business-Driven Requirements (contd) • Billing ability • Session authentication • Message integrity • Content committment (subscriber auditability, etc) • Media/MAC consistency • Common key-management architecture and practices • Encapsulation (SDE) may be different from media-to-media
Requirements Details • Session authentication • Individual identity/credential • Subscriber/human identity • end-point/hardware identification • Key management/agreement/distribution • Freshness of keying material • Flexible credentials • Ability to plug into existing infrastructures
Requirement Details (cont) • Message Integrity • Requires freshness of keying material • Strong cryptographic MAC function • Replay protection • Encryption • Flexibility in algorithm choice • Negotiation of *fresh* keys • Wire speed performance for whatever MAC is in use • “reasonable” footprint for skinny hardware
Requirement Details (contd) • Key management/agreement • Flexibility in credentials • Modern, publically analysed/available cryptographic primitives • Freshness guarantees • PFS? • Identity hiding? • Key translation/inter-MAC transport?