View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
Developing Secure, Multi-lateral Peer to Peer SIP Applications [email_address] VoIP Developer Conference 4 Aug 2004 – San Jose
Market Problem Ethernet Switch Router PSTN PSTN PSTN PSTN Internet or IP Network €£¥$ call Originating Domain Terminating Domain ? Service Provider POP Routing Access Control Accounting Settlement V V
Public / Private keys used for encryption / decryption and digital signatures
Public keys are public – easy to distribute
A digital certificate signed by a trusted 3 rd party ensures the public-key is legitimate
Digital signatures provide data integrity, authentication and non-repudiation
Certificates may be chained from a root authority
Security services between parties rely on the exchange of public keys and security of corresponding private keys.
Establishing PKI Security Services SIP Device Certificate Authority for Peer to Peer Authorization (OSP Server) Client Device requests public-key and certificate from CA CA sends its public key and its certificate Client Device sends certificate request to CA CA returns signed certificate Sign with CA private key VoIP Device Information VoIP Device Public Key Certified by Cert. Authority CA Signature Certificate