(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
Abstract
Sammanfattning
Preface
1. Introduction
2. Voice Over IP Overview
2.1 Introduction
2.2 Components, Protocols, and Standards
3. Introduction to SIP and RTP
3.1 Session Initiation Protocol (SIP)
3.1.1 Introduction
3.1.2 Functionality
3.1.3 SIP Requests and Responses
3.2 Real−Time Protocol (RTP)
3.2.1 Introduction
3.2.2 Terminology and Definitions
3.2.3 RTP Packet Format
3.2.4 RTCP Packet Format
4. Security Services
4.1 Security Attacks
4.2 Authentication
4.3 Access Control
4.4 Data Confidentiality
4.5 Data Integrity
4.6 Non−Repudiation
4.7 Availability
5. Cryptography Overview
5.1 Basic Knowledge
5.1.1 Introduction
5.1.2 Symmetric Cryptography
5.1.3 Asymmetric Cryptography
5.1.4 Symmetric Cryptography vs. Asymmetric Cryptography
5.1.5 Cryptanalysis
5.1.6 One−way Hash Functions and MACs
5.1.7 Overview of the Hash−based Message Authentication Code: HMAC 21
5.1.8 Certificates
5.1.9 Location of encryption devices
5.2 Basic Algorithm and Methods
5.2.1 Advanced Encryption Standard (AES)
5.2.1.1 AES History
5.2.1.1 Overview of the Algorithm
5.2.2 Data Encryption Standard (DES)
5.2.3 Secure Hash Algorithm (SHA)
5.2.3.1 SHA History
5.2.3.1 Overview of the Algorithm
5.2.4 Hash−Based Message Authentication Code
6. Public−Key Infrastructures
6.1 Introduction and Terminology
6.2 X.509 Certification Infrastructure
6.2.1 Chaining
6.2.2 Revocation of Certificates and Certificate Revocation Lists (CRLs) 31
6.3 Certification Infrastructure Models
7. Introduction to Security Protocols and Related Protocols
7.1 Internet Protocol Security (IPSec)
7.1.1 Introduction, Applications, and Benefits of IPSec
7.1.2 IPSec Architecture
7.1.2.1 IPSec Transport and Tunnel Modes
7.1.2.2 Authentication Header (AH)
7.1.2.3 Encapsulating Security Payload (ESP)
7.2 Transport Layer Security (TLS)
7.2.1 Introduction, Applications, and Benefits
7.2.2 SSL/TLS Architecture
7.2.2.1 SSL/TLS Record Protocol
7.2.2.2 SSL/TLS Handshake Protocol
7.3 Key Management Protocols
7.3.1 Introduction
7.3.2 IKE / ISAKMP
7.3.3 Simple Diffie−Hellman Key Exchange
8. Objective: Enabling a Secure Mobile VoIP call
9. Mobile Voice over IP: The Model and its Components
9.1 Significant Components
9.1.1 Mobile Nodes
9.1.2 SIP Servers
9.1.3 DSN Servers
9.2 The SIP Trapezoid
9.3 The SIP Registration
9.4 The RTP Session
9.5 Other Components
9.5.1 Home Agents
9.5.2 AAA Servers
9.5.3 Access Points
10. Alternative Solutions for Secure Mobile Voice over IP
10.1 Security Requirements of the Model
10.2 Securing SIP
10.2.1 Using SSL/TLS in a PKI
10.2.2 Using IPSec
10.2.3 Securing SDP Bodies and SIP Headers
10.2.4 Securing the DNS look−up
10.2.5 Conclusions
10.3 Securing the media stream
10.3.1 Secure Transport Protocol
10.3.2. Key Management
11. A Secure Model for Mobile Voice over IP
11.1 Overview of the Model
11.2 Interoperation of the Components
11.3 Rationale
11.3.1 TLS supported by a PKI
11.3.2 DNSSEC
11.3.3 The User Agent: MINISIP
11.3.4 SRTP vs. IPSec and VPNs
11.3.5 MIKEY
12. SIP Security
12.1 Background
12.2 TLS within SIP
12.3 A First Approach
13. Secure Real−Time Protocol
13.1 SRTP Description
13.1.1 SRTP Packet
13.1.2 SRTCP Packet
13.1.3 Message Authentication and Integrity
13.1.4 Key Derivation
13.1.5 Cryptographic Context
13.1.6 Packet Processing
13.1.7 Predefined Algorithms
13.1.7.1 Encryption
13.1.7.2 Message Authentication and Integrity
13.2 SRTP Implementation: MINIsrtp
13.2.1 Introduction
13.2.2 Tools
13.2.3 Features
13.2.4 Description
13.2.4.1 Classes
13.2.4.2 Algorithm
13.2.4.3 SRtpPacket Class Methods
13.2.4.4 CryptoContext Class Methods
13.2.4.5 Bug Information
13.2.4.6 License
14. Multimedia Internet KEYing (MIKEY)
14.1 Overview
14.2 MIKEY Framework for Secure Mobile VoIP
14.2.1 Terminology Relationship
14.2.2 MIKEY within SIP
14.2.3 MIKEY Integration into SDP
14.2.4 Error Handling
14.2.5 MIKEY Over an Unreliable Transport Protocol
14.2.6 MIKEY Payloads
14.2.7 MIKEY Interface
14.2.8 MIKEY Exchange Method: Signed Diffie−Hellman
15. Description of the Implementation of the Model and its Analysis
15.1 Implementation
15.1.1 MINIsrtp Development
15.1.2 Integration of MINIsrtp into MINISIP User Agent
15.1.3 Setting up of the SIP Servers
15.2 Analysis and Validation of the Model
15.2.1 MINIsrtp Correctness
15.2.2 Performance Measurements on MINIsrtp
16. Conclusions and Future Work
16.1 Conclusions
16.2 Future Work in this Area
Appendix A: MINIsrtp Source Code
Appendix B: A First Approach to a MIKEY Messages Implementation
Appendix C: Acronyms
Appendix D: Notation
Appendix E: Glossary
Figures and Tables Index
References




