Signaling AES256_CM encryption for SRTP in H245/h225

Discussion related to the ITU-T Recommendation H.323
Post Reply
paragbm
Posts: 2
Joined: Thu Jun 26, 2014 3:13 pm

Signaling AES256_CM encryption for SRTP in H245/h225

Post by paragbm » Thu Jun 26, 2014 3:24 pm

Hi All,

I would like to know the OID's to be used to signal AES256_CM(counter mode) encryption which uses SHA1-HMAC 32 and SHA1-HMAC80 for authentication. The H235.6 does not specify these ?

Thanks
-Parag

paragbm
Posts: 2
Joined: Thu Jun 26, 2014 3:13 pm

Re: Signaling AES256_CM encryption for SRTP in H245/h225

Post by paragbm » Sat Jun 28, 2014 5:56 am

Just to clarify a bit more , I want to signal the SRTP capabilites in Termincal Capability Set and need to know the OID values to be used for AES256_CM with HMAC-32 and HMAC-80 for hashing.

shorne
Posts: 45
Joined: Thu Aug 27, 2009 4:17 am

Re: Signaling AES256_CM encryption for SRTP in H245/h225

Post by shorne » Sun Jun 29, 2014 3:24 pm

H.235.6 is the industry's agreed standard which uses regular RTP with DH exchange.
2.16.840.1.101.3.4.1.42
DHE-RSA-AES256-SHA

Your looking at H.235.8 with SRTP which is not widely supported in H.323 and there is no OIDs defined for AES256. You are free to create you own as there is nothing defined.

User avatar
paulej
Posts: 524
Joined: Sun Aug 23, 2009 7:32 pm
Location: Research Triangle Park, NC, USA
Contact:

Re: Signaling AES256_CM encryption for SRTP in H245/h225

Post by paulej » Mon Jun 30, 2014 10:29 am

Let me add that if you want to define something and make it a part of the standard, contact me privately and I'll discuss how to go about that.

Post Reply