Design and Implementation of Public key-based Video Conference System for Authentication and Encryption

공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현

  • 정용득 (대한무역투자지흥공사) ;
  • 이상훈 (숭실대학교 대학원 컴퓨터학부) ;
  • 전문석 (숭실대학교 정보과학대학)
  • Published : 2004.12.01


This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.


  1. E. Rescorla, Diffie-Hellman Key Agreement Method, IETF RFC 2631, 1999
  2. Federal Information Processing Standards Publication, Announcing the Advanced Encryption Standard(AES), 2001
  3. ITU-T Recommendation H.323, Visual Telephone Systems and Equipment for Local Area Networks which Provide a Non-Guaranteed Quality Service(ver4), 2000
  4. Jacobson, V. and McCanne, S., 'Visual Audio Tool,' Lawrence Berkery Laboratory
  5. ITU-T Recommendation H.225.0, Media Stream Packetization and Synchronization Non-Guaranteed Quality of Service LANs(ver4), 2000
  6. L. Berc, W. Fenner, R. Frederick, S. McCanne, 'RTP Payload Format for JPEG-compressed Video,' RFC 2035, October, 1996
  7. ITU-T Recommendation H.245, Control Protocol for Multimedia Communication(ver8), 2001
  8. ITU-T Recommendation H.235 Security Encryption for H-series Multimedia terminals(ver3), 2001
  9. R. Rivest, A Description of the RC2(r) Encryption Algorithm, IETF RFC 2268, 1998
  10. William stallings, Cryptography and Network security, Prentice Hall, 1998
  11. S. A. Thomas, SSL&TLS Essentials: securing the web Wiley, 2000
  12. 한국전자통신연구원, 암호학의 기초, 경문사, 1999
  13. T. Dierks, C. Allen, 'The TLS Protocol Version 1.0,' IETF RFC 2246, January, 1999
  14. M. Baugher, D. McGrew, Cisco Systems, Inc. M. Naslund, E. Carrara, K. Norrman, Ericsson Research, 'The Secure Real-time Transport Protocol(SRTP),' IETF RFC 3711, March, 2004
  15. Russ Housley and Tim Polk, Planning for PKI, John Wiley & Sons, 2002
  16. Whitfield Diffie and Martin Hellman, 'New Directions in Cryptography', IEEE Transaction on Information Theory, Vol.1T, No.6, November,1976