Authenticated Identity Body
   HOME

TheInfoList



OR:

Authenticated Identity Body or AIB is a method allowing parties in a
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
to share authenticated identity, thereby increasing the integrity of their SIP communications. AIBs extend other authentication methods like S/MIME to provide a more specific mechanism to introduce integrity to SIP transmissions. Parties transmitting AIBs
cryptograph AB Cryptograph was a Aktiebolag, limited Swedish company developing and selling crypto machines, founded on 21 July 1916 and liquidated in 1930. It was probably the first company in the world to focus entirely on the cryptographic market. In De ...
ically sign a subset of SIP message headers, and such signatures assert the message originator's identity. To meet requirements of reference integrity (for example in defending against replay attacks) additional SIP message headers such as 'Date' and 'Contact' may be optionally included in the AIB. AIB is described and discussed in RFC 3893: ''"For reasons of end-to-end privacy, it may also be desirable to encrypt AIBs .. While encryption of AIBs entails that only the holder of a specific key can decrypt the body, that single key could be distributed throughout a network of hosts that exist under common policies. The security of the AIB is therefore predicated on the secure distribution of the key. However, for some networks (in which there are
federation A federation (also called a federal state) is an entity characterized by a political union, union of partially federated state, self-governing provinces, states, or other regions under a #Federal governments, federal government (federalism) ...
s of trusted hosts under a common
policy Policy is a deliberate system of guidelines to guide decisions and achieve rational outcomes. A policy is a statement of intent and is implemented as a procedure or protocol. Policies are generally adopted by a governance body within an or ...
), the widespread distribution of a
decryption key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
could be appropriate. Some
telephone A telephone, colloquially referred to as a phone, is a telecommunications device that enables two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most ...
networks, for example, might require this model. When an AIB is encrypted, the AIB should be encrypted before it is signed."''


See also

*


References

Computer networks engineering Cryptographic software VoIP protocols VoIP software {{crypto-stub