Linksys RTP300 User Guide - Page 58

Secure Call Details, Using a Mini-Certificate, User ID or Phone Number 16B

Page 58 highlights

Secure Call Implementation Secure Call Details Looking at the second stage of setting up a secure call in greater detail, this stage can be further divided into two steps. 1. The caller sends a "Caller Hello" message (base64 encoded and embedded in the message body of a SIP INFO request) to the called party with the following information: • Message ID (4B) • Version and flags (4B) • SSRC of the encrypted stream (4B) • Mini-Certificate (252B) Upon receiving the Caller Hello, the called party responds with a Callee Hello message (base64 encoded and embedded in the message body of a SIP response to the caller's INFO request) with similar information, if the Caller Hello message is valid. The caller then examines the Callee Hello and proceeds to the next step if the message is valid. 2. The caller sends the "Caller Final" message to the called party with the following information: • Message ID (4B) • Encrypted Master Key (16B or 128b) • Encrypted Master Salt (16B or 128b) The Master Key and Master Salt are encrypted with the public key from the called party mini-certificate. The Master Key and Master Salt are used by both ends for deriving session keys to encrypt subsequent RTP packets. The called party then responds with a Callee Final message (which is an empty message). Using a Mini-Certificate The Mini-Certificate (MC) contains the following information: • User Name (32B) • User ID or Phone Number (16B) • Expiration Date (12B) • Public Key (512b or 64B) • Signature (1024b or 512B) The MC has a 512-bit public key used for establishing secure calls. The administrator must provision each subscriber of the secure call service with an MC and the corresponding 512-bit private key. The MC is signed with a 1024-bit private key of the service provider, which acts as the CA of the MC. The 1024-bit public key of the CA signing the MC must also be provisioned for each subscriber. Linksys ATA Administration Guide 58

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201

Linksys ATA Administration Guide
58
Secure Call Implementation
Secure Call Details
Looking at the second stage of setting up a secure call in greater detail, this stage can be
further divided into two steps.
1.
The caller sends a “Caller Hello” message (base64 encoded and embedded in the message
body of a SIP INFO request) to the called party with the following information:
Message ID (4B)
Version and flags (4B)
SSRC of the encrypted stream (4B)
Mini-Certificate (252B)
Upon receiving the Caller Hello, the called party responds with a Callee Hello message
(base64 encoded and embedded in the message body of a SIP response to the caller’s INFO
request) with similar information, if the Caller Hello message is valid. The caller then
examines the Callee Hello and proceeds to the next step if the message is valid.
2.
The caller sends the “Caller Final” message to the called party with the following
information:
Message ID (4B)
Encrypted Master Key (16B or 128b)
Encrypted Master Salt (16B or 128b)
The Master Key and Master Salt are encrypted with the public key from the called party
mini-certificate. The Master Key and Master Salt are used by both ends for deriving session
keys to encrypt subsequent RTP packets. The called party then responds with a Callee Final
message (which is an empty message).
Using a Mini-Certificate
The Mini-Certificate (MC) contains the following information:
User Name (32B)
User ID or Phone Number (16B)
Expiration Date (12B)
Public Key (512b or 64B)
Signature (1024b or 512B)
The MC has a 512-bit public key used for establishing secure calls. The administrator must
provision each subscriber of the secure call service with an MC and the corresponding 512-bit
private key. The MC is signed with a 1024-bit private key of the service provider, which acts as
the CA of the MC. The 1024-bit public key of the CA signing the MC must also be provisioned
for each subscriber.