Design and Implementation of Public key-based Video Conference System for Authentication and Encryption 


Vol. 11,  No. 7, pp. 971-980, Dec.  2004
10.3745/KIPSTC.2004.11.7.971


PDF
  Abstract

This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information : while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based encryption key.

  Statistics


  Cite this article

[IEEE Style]

Y. D. Jung, S. H. Lee, M. S. Jun, "Design and Implementation of Public key-based Video Conference System for Authentication and Encryption," The KIPS Transactions:PartC, vol. 11, no. 7, pp. 971-980, 2004. DOI: 10.3745/KIPSTC.2004.11.7.971.

[ACM Style]

Yong Deug Jung, Sang Hun Lee, and Moon Seog Jun. 2004. Design and Implementation of Public key-based Video Conference System for Authentication and Encryption. The KIPS Transactions:PartC, 11, 7, (2004), 971-980. DOI: 10.3745/KIPSTC.2004.11.7.971.