Font Size: a A A

Research And Implementation Of IP Video Phone Secure Strategy

Posted on:2012-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:W Z WangFull Text:PDF
GTID:2178330332987538Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of the network, the IP video phone will be widely used. It is an inevitable trend that the traditional telephone will be substituted for the IP video phone. Especially with the high development of information industry, and being in the next generation network mode which is based on Internet and IP technology, IP video phone will lead the trend of modern communications. With the wide application of IP video phone, people begin to pay more and more attention on the security of the communications using IP video telephone.The paper which derives from the national "11th Five-Year Plan" studied the security strategy of IP video phone, proposed an end-to-end IP video phone security strategy, designed embedded security platform, realized the security strategy on it. The security strategy has been testified correctly and safely by joint test with the IP video phone that made by the discussion group. The main tasks are as follows:Firstly, by studying the architecture and key technologies of IP video phone, combining signaling control and media stream transport, the paper analyzed the security threats of IP video phone. According to the architecture of IP video phone, classification and comparison have been made to the existing security policy of IP video phones. A deep research on the existing security policy has been done already.Secondly, based on the research on the existing security policy, aiming at signaling protocol security, the paper designed an Authentication and Key Agreement which is based on self-certified key, Analysed security and performance of the agreement. To ensure the security of media stream transport, the paper designed a security scheme which is based on SMS4 block cipher algorithm. With the two mentioned above, an end-to-end security strategy on IP video phone is proposed. The security analysis on the strategy is given, and the characteristic of the strategy has been pointed out.Finally, by using the "dual-core" method which combines DSP processors and dedicated cipher chips, the paper designs embedded secure platform to put the end-to-end IP video phone security strategy into practice. The security strategy has been realized in the embedded secure platform, conducted joint test on IP video phone that has been made by the discussion group, and the correctness and security of security strategy have been testified.
Keywords/Search Tags:IP Video Phone, Secure Strategy, Self-Certfied Key, Data Privacy
PDF Full Text Request
Related items