Rist main profile authentication, Technology overview – Cobalt Co9992-4ENC-4K-HEVC Software-Defined Broadcast Encoder User Manual

Page 118

Advertising
background image

118

RIST Main Profile Authentication

Technology Overview

RIST Main Profile security (encryption and authentication) is provided by DTLS, which is the
datagram version of the TLS functionality used to secure web sites. This technology is mature
and widely deployed.
DTLS authentication is based on the concept of

Key/Certificate

pairs. A

Key

must be kept

secret. A

Certificate

is derived from the

Key

and is public. A certificate allows secure

communication, but only with the device that holds the corresponding key.
A certificate may be signed by a third party called a

Certificate Authority (CA)

. This is a third

party that is trusted; if a device is prepared to trust the Certificate Authority, that trust extends to
the certificates signed by it.
The certificate-based authentication process is illustrated in Figure 1. In this figure, Device B is
deciding whether or not it trusts Device A. The same process can happen independently in the
other direction. Device B has decided to trust certificates signed by a certain CA, so it has a
copy of its CA Certificate, which was transferred to it through some secure means. Device B
then receives a certificate from Device A. Unless that certificate matches the key stored in
Device A, communication cannot even start. Device B can locally check the CA signature in the
certificate coming from Device A against the CA Certificate it has. It that signature matches,
and if Device B is prepared to trust the CA, then it will agree to communicate with Device A.

Security is maintained since:

Even though the certificate from Device A is public, an unauthorized device cannot use it
to establish communication because it does not have the corresponding key.
Communication will not start.

An unauthorized device may have a consistent certificate/key pair, but it will not be able
to use it to start communication because the certificate is not signed by the CA trusted by
Device B.

Figure 1: Certificate Checking

Advertising