Browse > Article
http://dx.doi.org/10.4218/etrij.15.0114.0883

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network  

Pattaranantakul, Montida (Wireless Information Security and Eco-Electronics Research Unit (WISRU), National Electronics and Computer Technology Center)
Sanguannam, Kittichai (Department of Information Technology, Triple T Broadband Public Company Limited)
Sangwongngam, Paramin (Intelligent Devices and System Research Unit (IDSRU), National Electronics and Computer Technology Center)
Vorakulpipat, Chalee (Wireless Information Security and Eco-Electronics Research Unit (WISRU), National Electronics and Computer Technology Center)
Publication Information
ETRI Journal / v.37, no.4, 2015 , pp. 696-706 More about this Journal
Abstract
This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.
Keywords
Quantum cryptography; key management; custom protocols; symmetric encryption; real-time message protocol; RTMP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Chin, Next Generation Video Conferencing, Boosting Productivity of the Decentralized Workforce White Paper, Arkadin Global Conferencing, Los Altos: CA, USA, 2011.
2 F. Liu and H. Koenig, "A Survey of Video Encryption Algorithms," Comput. Security, vol. 29, no. 1, 2010, pp. 3-15.   DOI
3 J. Shah and V. Saxena, "Video Encryption: A Survey," IJCSI, vol. 8, no. 2, Mar. 2011, pp. 525-534.
4 B. Kurht and D. Kirovski, "Multimedia Security Handbook," Boca Raton, FL, USA: CRC Press, 2004.
5 S. Frankel et al., "Guide to IPsec VPNs," Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-113, Gaithersburg, MD, USA, Dec. 2008.
6 J.A. Perez et al., "Quality of Service Analysis of IPSec VPNs for Voice and Video Traffic," AICT/ICIW, Guadeloupe, French Caribbean, Feb. 19-25, 2006, pp. 43-48.
7 S. Park et al., "Characterizing the Impacts of VPN Security Models on Streaming Video," CNSR, Montreal, Canada, May 11-14, 2010, pp. 152-159.
8 O. Adeyinka, "Analysis of IPSec VPNs Performance in Multimedia Environment," IET, Seattle, WA, USA, July 21-22, 2008, pp. 1-5.
9 Z. Li et al., "Authentication to Peer-to-Peer Network: Survey and Research Direction," NSS, Gold Coast, Australia, Oct. 19-21, 2009, pp. 115-122.
10 W. Fumy and P. Landrock, "Principle of Key Management," IEEE J. Sel. Areas Commun., vol. 11, no. 5, June 1993, pp. 785-793.   DOI
11 W. Diffie and M.E. Hellman, "New Direction in Cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, Nov. 1976, pp. 644-654.   DOI
12 W. Stallings, "Cryptography and Network Security Principles and Practices," 4th ed., New York, USA: Pearson Education, Inc., 2005.
13 M. Saadi et al., "Design and Implementation of Secure and Reliable Communication Using Optical Wireless Communication," Frequenz, vol. 68, no. 11-12, Nov. 2014, pp. 501-509.
14 W.K. Wootters and W.H. Zurek, "A Single Quantum Cannot be Cloned," Nature, vol. 299, no. 5886, Oct. 1982, pp. 802-803.   DOI
15 M. Pattaranantakul et al., "Secure and Efficient Key Management Technique in Quantum Cryptography Network," ICUFN, Phuket, Thailand, July 4-6, 2012, pp. 280-285.
16 M.A. Nielsen and I.L. Chuang, "Quantum Computation and Quantum Information," 10th ed., Cambridge, UK: Cambridge University Press, Jan. 2011.
17 S. Wiesner, "Conjugate Coding," ACM Sigact News, vol. 15, no. 1, 1983, pp. 78-88.   DOI
18 C.H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," IEEE Int. Conf. Comput., Syst., Signal Process., Bangalore, India, 1984, pp. 175-179.
19 C.H. Bennett, "Quantum Cryptography Using Any Two Non-orthogonal States," Physical Rev. Lett., vol. 68, no. 21, May 1992, pp. 3121-3124.   DOI
20 ISO/IEC 11770-5:2011, Inf. Technol. - Security Techn. - Key Manag. - Part 5: Group Key Manag., ISO/IEC Standard, 2011. Accessed June 2, 2014. http://www.iso.org/iso/catalogue_detail.htm?csnumber=54527
21 Standard Committee X9 Incorporated, ANSI, X9.24 - Retail Financial Services Systematic Key Manag. - Part 1: Using Systematic Techn., ANSI Standard, 2004. Accessed June 2, 2014. http://webstore.ansi.org/RecordDetail.aspx?sku=ANSI+X9.24-1%3A2009
22 E. Barker et al., "Recommendation for Key Management - Part 1: General (Revision 3)," NIST Special Publication 800-57, Gaithersburg, MD, USA, July 2012, pp. 1-147.
23 E. Barker et al., "Recommendation for Key Management - Part 2: Best Practices for Key Management Organization," NIST Special Publication 800-57, Gaithersburg, MD, USA, Feb. 2014, pp. 1-78.
24 E. Barker et al., "Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance (Revision 1)," NIST Special Publication 800-57, Gaithersburg, MD, USA, Apr. 2014, pp. 1-94.
25 BBN Technologies, "DARPA Quantum Network Testbed," Air Force Research Laboratory, New York, NY, USA, Final Tech. Rep. AFRL-IF-TR-2007-180, 2007.
26 C. Elliott, "Building the Quantum Network," New J. Physics, vol. 4, no. 46, July 2002, pp. 46-55.   DOI
27 M. Dianati and R. Alleaume, "Architecture of Secoqc Quantum Key Distribution Network," ICQNM, Guadeloupe, French Caribbean, Jan. 2-6, 2007, p. 13.
28 M. Peev et al., "The SECOQC Quantum Key Distribution Network in Vienna," New J. Physics, vol. 11, no. 7, July 2009, pp. 1-37.
29 O. Maurhart, Q3P A Proposal, SECOQC Project, 2006. Accessed June 2, 2014. http://www.secoqc.net
30 ID Quantique, Swiss Quantum Project, 2011. Accessed June 2, 2014. http://swissquantum.idquantique.com
31 M. Fujiwara et al., "Field Demonstration of Quantum Key Distribution in the Tokyo QKD Network," CLEO/IQEC/PACIFIC RIM, Sydney, Australia, 2011, pp. 507-509.
32 H. Parmar and M. Thornburgh, "Adobe's Real Time Messaging Protocol," Copyright Adobe Systems Incorporated, Dec. 2012, pp. 1-52.
33 M. Dianati and R. Alleaume, "Transport Layer Protocols for the SECOQC Quantum Key Distribution (QKD) Network," LCN, Dublin, Ireland, Oct. 15-18, 2007, pp. 1025-1034.
34 OpenMeetings, Open-Source Web-Conferencing, Apache OpenMeetings Project, 2014. Accessed June 2, 2014. http://code.google.com/p/openmeetings/
35 F. Wang, Z. Xiao, and J. Chen, "Research on Security of Trusted Network and its Prospects," ETCS, Wuhan, China, Mar. 6-7, 2010, pp. 256-259.
36 C. Du et al., "VCNF: A Secure Video Conferencing System Based on P2P Technology," IEEE HPCC, Dalian, China, Sept. 25-27, 2008, pp. 463-469.