H.235

Last updated
H.235
Security and encryption for H-Series (H.323 and other H.245-based) multimedia terminals
Public key encryption.svg
StatusIn force
Year started1998
Latest version(01/05)
January 2005
Organization ITU-T
Related standards H.323, H.245
Domain cryptography
LicenseFreely available
Website https://www.itu.int/rec/T-REC-H.235

H.235 covers security and encryption for H.323 and other H.245 based terminals. [1]

The standard addresses authentication by means of several algorithms, including Diffie-Hellman methods, and privacy. Privacy allows for encryption, also of the media streams.

The standardization board agreed on H.235.1 (former H.235 Annex D [2] ) to be the minimum requirement of an H.235 conforming implementation. H.235.1, also known as Baseline Security Profile defines Authentication and Integrity.

An H.235.1 aware H.323 Gatekeeper can thereby assure that only trusted H.323 endpoints are granted access to the Gatekeeper's services.

Related Research Articles

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

Advanced Video Coding (AVC), also referred to as H.264 or MPEG-4 Part 10, Advanced Video Coding, is a video compression standard based on block-oriented, motion-compensated integer-DCT coding. It is by far the most commonly used format for the recording, compression, and distribution of video content, used by 91% of video industry developers as of September 2019. It supports resolutions up to and including 8K UHD.

Data Over Cable Service Interface Specification is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television (CATV) system. It is used by many cable television operators to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure. The version numbers are sometimes prefixed with simply "D" instead of "DOCSIS".

H.225.0 is part of the H.323 family of telecommunication protocols.

H.245 is a control channel protocol used with[in] e.g. H.323 and H.324 communication sessions, and involves the line transmission of non-telephone signals. It also offers the possibility to be tunneled within H.225.0 call signaling messages. This eases firewall traversing.

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.

Authenticated encryption (AE) and authenticated encryption with associated data (AEAD) are forms of encryption which simultaneously assure the confidentiality and authenticity of data.


H.320 or Narrow-band visual telephone systems and terminal equipment is an umbrella Recommendation by the ITU-T for running Multimedia (Audio/Video/Data) over ISDN based networks. The main protocols in this suite are H.221, H.230, H.242, audio codecs such as G.711 (PCM) and G.728 (CELP), and discrete cosine transform (DCT) video codecs such as H.261 and H.263.

H.324 is an ITU-T recommendation for voice, video and data transmission over regular analog phone lines. It uses a regular 33,600 bit/s modem for transmission, the H.263 codec for video encoding and G.723.1 for audio.

Wireless security prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP is an old IEEE 802.11 standard from 1997, which was superseded in 2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.1X.

H.239 is an ITU-T recommendation from the H.32x Multimedia Communications' macrofamily of standards for multimedia communications over various networks.

EAX mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers. It is an Authenticated Encryption with Associated Data (AEAD) algorithm designed to simultaneously provide both authentication and privacy of the message with a two-pass scheme, one pass for achieving privacy and one for authenticity for each block.

H.323 is a Recommendation from the ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audio-visual communication sessions on any packet network. The H.323 standard addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences.

The International Multimedia Telecommunications Consortium (IMTC) is an organization consisting of several companies interested in real-time, rich-media communications. Rich media includes voice and one-way data and one-way video. Members of this community include Internet application developers and service providers, teleconferencing hardware and software suppliers and service providers, telecommunications service providers and equipment vendors, end users, educational institutions, government agencies and non-profit corporations. On July 28, 2014 IMTC and the Unified Communications Interoperability Forum (UCIF) merged into one consortium. The UCI Forum defined interoperability profiles and certification tests, implementation guidelines, and best practices for interoperability between UC products and existing applications.

G.hn is a specification for home networking with data rates up to 2 Gbit/s and operation over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber. A single G.hn semiconductor device is able to network over any of the supported home wire types. Some benefits of a multi-wire standard are lower equipment development costs and lower deployment costs for service providers.

H.241 is a Recommendation from the ITU Telecommunication Standardization Sector (ITU-T) that defines extended video procedures and control signals for H.300-series terminals, including H.323 and H.320.

GNU Gatekeeper

GNU Gatekeeper is an open-source project that implements an H.323 Gatekeeper based on the OpenH323 or H323Plus stack. A gatekeeper provides address translation, admissions control, call routing, authorization and accounting services to an H.323 system defined on the H.323 standard by ITU-T.

Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X.800 Recommendation.
X.800 and ISO 7498-2 are technically aligned. This model is widely recognized

The IEEE 802.15.6 standard is the latest international standard for Wireless Body Area Network (WBAN).

References

  1. "H.235 : Security and encryption for H-series (H.323 and other H.245-based) multimedia terminals". www.itu.int. Archived from the original on 2013-10-09. Retrieved 2019-11-12.
  2. ITU-T Recommendation H.235.0 (09/05), Appendix IV, page 40