CONTENTS

 1     Scope
 2     References
 3     Terms and definitions
 4     Symbols and abbreviations
 5     Conventions
 6     System introduction
        6.1     Summary
        6.2     Authentication
                  6.2.1     Certificates
        6.3    Call establishment security
        6.4     Call control (H.245) security
        6.5     Media stream privacy
        6.6     Trusted elements
                  6.6.1     Key escrow
        6.7     Non-repudiation
 7     Connection establishment procedures
        7.1     Introduction
 8     H.245 signalling and procedures
        8.1     Secure H.245 channel operation
        8.2     Unsecured H.245 channel operation
        8.3     Capability exchange
        8.4     Master role
        8.5     Logical channel signalling
 9     Multipoint procedures
        9.1     Authentication
        9.2     Privacy
10     Authentication signalling and procedures
       10.1     Introduction
       10.2     Diffie-Hellman with optional authentication
       10.3     Subscription-based authentication
                 10.3.1     Introduction
                 10.3.2     Password with symmetric encryption
                 10.3.3     Password with hashing
                 10.3.4     Certificate-based with signatures
                 10.3.5     Usage of shared secret and passwords
11     Media stream encryption procedures
       11.1     Media session keys
       11.2     Media anti-spamming
                 11.2.1     List of Object Identifiers
12     Security error recovery
13     Asymmetric Authentication and Key Exchange Using Elliptic Curve CryptoSystems
       13.1     Key management
       13.2     Digital signature
Annex A – H.235 ASN.1
Annex B – H.323 specific topics
        B.1     Background
        B.2     Signalling and procedures
                  B.2.1     Revision 1 compatibility
        B.3     RTP/RTCP issues
        B.4     RAS signalling/procedures for authentication
                  B.4.1     Introduction
                  B.4.2     Endpoint-gatekeeper authentication (non-subscription-based)
                  B.4.3     Endpoint-gatekeeper authentication (subscription-based)
        B.5     Non-terminal interactions
                  B.5.1     Gateway
Annex C – H.324 specific topics
Annex D – Baseline security profile
        D.1     Introduction
        D.2     Specification conventions
        D.3     Scope
        D.4     Abbreviations
        D.5     Normative references
        D.6     Baseline security profile
                  D.6.1     Overview
                  D.6.2     Authentication and Integrity
                  D.6.3     H.323 requirements
                  D.6.4     Direct-routed scenario
                  D.6.5     Back-end-Service Support
                  D.6.6     H.235 Version 1 compatibility
                  D.6.7     Multicast behaviour
        D.7     Voice Encryption Security Profile
                  D.7.1     Key management
                  D.7.2     Key update and synchronization
                  D.7.3     Triple-DES in outer CBC mode
        D.8     Lawful Interception
        D.9     List of secured signalling messages
                  D.9.1     H.225.0 RAS
                  D.9.2     H.225.0 call signalling
                  D.9.3     H.245 call control
       D.10     Usage of sendersID and generalID
       D.11     List of Object Identifiers
       D.12     Bibliography
Annex E – Signature profile
        E.1     Overview
        E.2     Specification conventions
        E.3     H.323 requirements
        E.4     Security services
        E.5     Digital signatures with public/private key pairs details (Procedure II)
        E.6     Multipoint conferencing procedures
        E.7     End-to-end authentication (Procedure III)
        E.8     Authentication-only
        E.9     Authentication and Integrity
       E.10     Computation of the digital signature
       E.11     Verification of the digital signature
       E.12     Handling of certificates
       E.13     Usage illustration for Procedure II
                 E.13.1     RAS message authentication, integrity and non-repudiation
                 E.13.2     RAS authentication only
                 E.13.3     H.225.0 message authentication, integrity and non-repudiation
                 E.13.4     H.245 message authentication and integrity
       E.14     H.235 Version 1 compatibility
       E.15     Multicast behaviour
       E.16     List of secure signalling messages
                 E.16.1     H.225.0 RAS
                 E.16.2     H.225.0 call signalling
       E.17     Usage of sendersID and generalID
       E.18     List of Object Identifiers
Appendix I – H.323 implementation details
        I.1     Ciphertext padding methods
        I.2     New keys
        I.3     H.323 trusted elements
        I.4     Implementation examples
                  I.4.1     Tokens
                  I.4.2     Token usage in H.323 systems
                  I.4.3     H.235 random value usage in H.323 systems
                  I.4.4     Password
                  I.4.5     IPSEC
                  I.4.6     Back-end service support
Appendix II – H.324 implementation details
Appendix III – Other H-series implementation details
Appendix IV – Bibliography