H.235
   HOME

TheInfoList



OR:

H.235 covers
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
and
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
for H.323 and other H.245 based terminals. The standard addresses authentication by means of several
algorithms In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for performing ...
, including Diffie-Hellman methods, and privacy. Privacy allows for encryption, also of the media streams. The standardization board agreed on H.235.1 (former H.235 Annex D ITU-T Recommendation H.235.0
(09/05), Appendix IV, page 40) to be the minimum requirement of an H.235 conforming implementation. H.235.1, also known as ''Baseline Security Profile'' defines
Authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
and
Integrity Integrity is the practice of being honest and showing a consistent and uncompromising adherence to strong moral and ethical principles and values. In ethics, integrity is regarded as the honesty and truthfulness or accuracy of one's actions. In ...
. An H.235.1 aware H.323 Gatekeeper can thereby assure that only trusted H.323 endpoints are granted access to the Gatekeeper's services.


References

{{reflist


External links


ITU-T Recommendation H.235.1 Baseline security profile
Cryptographic protocols ITU-T recommendations