Chapter-13 (Application Support Functions) : Presentation On Multimedia Communication
Chapter-13 (Application Support Functions) : Presentation On Multimedia Communication
Submitted to
Dr. Basant Kumar
(Associate Professor)
Department of Electronics and Communication Engineering
MNNIT ALLAHABAD
PRAYAGRAJ, 211004
List of Contents
➢ 13.1- Introduction
➢ 13.2- ASN.1
➢ 13.3- Security
➢ 13.4- Data Encryption
Introduction
➢ Acronym for Abstract Syntax Notation One, a language for describing structured information;
typically, information intended to be conveyed across some interface or communication
medium.
➢ Has been standardised internationally. It is widely used in the specification of communication
protocols.
➢ With ASN.1, the protocol designer can view and describe the relevant information and its
structure at a high level and need not be unduly concerned with how it is represented while in
transit .Compilers can provide run-time code to convert an instance of user or protocol
information to bits on the line.
➢ The "One" was added to the ASN name by ISO to leave open the future possibility of a better
language for expressing abstract syntaxes.
ABSTRACT SYNTAX
WeatherReport::=SEQUENCE
{
stationNumber INTEGER (1..99999),
timeOfReport UTCTime
pressure INTEGER (850..1100)
temperature INTEGER (-100..60)
humidity INTEGER (0..100)
windVelocity INTEGER (0..500)
windDirection INTEGER (0..48)
}
TRANSFER SYNTAX
➢ The first defined for ASN.1 was the Basic Encoding Rules (BER)
➢ The BER allow the automatic derivation of a transfer syntax for every abstract syntax
defined using ASN.1. Transfer syntaxes produced by application of the BER can be used
over any communications medium which allows the transfer of strings of octets. Encoding
and decoding subroutines can be developed once and then used in a wide range of
applications.
➢ A set of encoding rule can only be developed in the context of an agreed set of concepts such
as those provided by ASN.1.
➢ As the structure of ASN.1 is hierarchical, the basic encoding rules follow this structure. They
operate on a Tag, Length and Value (TLV) scheme. The structure is therefore recursive such
that the contents can be a series of TLVs.
TYPES AND VALUES
➢ A type is a (non-empty) set of values, and represents a potential for conveying information.
Only values are actually conveyed, but their type governs the domain of possibilities.
➢ There can be two types:
○ Primitive:
For example,
■ INTEGER
■ BOOLEAN
■ OCTETSTRING
● CONTEXT-SPECIFIC: the tag has meaning only within the scope of the present structure type;
● APPLICATION: the tag has meaning in the context of the complete application (collection of
types);
● PRIVATE: the tag has meaning only to the user.
Data security
➢ Method : Substitute the plain text alphabets with a new alphabet (ciphertext alphabet)
➢ Ciphertext alphabet can be defined as that which is shifted by n places.
Plaintext alphabet: a b c d e f . . .
Ciphertext alphabet: d e f g h i . . .
➢ Problem : Statistical property of text can be exploited by an intruder to break the code.
➢ Alternative : To reorder (transpose) the characters in groups.
➢ That is to create groups of fixed size and then send first alphabet of groups together followed
by second and so on.
Data Encryption Standard (DES)
➢ DES and IDA both use same key for encryption and decryption.
➢ The distribution of keys is a major problem with private key encryption systems.
➢ To overcome this public key method is used.
➢ Different key are used for encryption and decryption.
➢ Number theory is used to develop two numbers, such that encryption by one can be decrypted
by only the second number.
➢ Second number cannot be derived from the first.
➢ First number form the public key, and other is the private key.
➢ Any one can send an encrypted message to a particular user with the public key, but can only
be decrypted by the one having the private key.
➢ Issue of receiving a forged message from a non legitimate source, which needs to be solved by
proper authentication and nonrepudiation.