CONTENTS

 1     Scope 
 2     References 
        2.1     Normative references         
        2.2     Informative references        
 3     Definitions  
 4     Abbreviations   
 5     Conventions     
 6     Basic framework 
        6.1     Improved negotiation capabilities in H.235.0          
        6.2     Use between endpoint and gatekeeper       
        6.3     Use of profile between gatekeepers
        6.4     Signalling channel encryption and authentication      
 7     A specific security profile (SP1)   
 8     An improved security profile (SP2)          
        8.1     Call Signalling sequence number     
        8.2     Generation of Weak Encryption Key from password          
        8.3     Nonce size
        8.4     Initialization vector salting   
        8.5     ClearToken encoding         
 9     Extensions to the framework (Informative)
        9.1     Using the master key to secure the call signalling channel via TLS    
        9.2     Use of certificates to authenticate the gatekeeper    
        9.3     Use of alternative signalling security mechanisms     
10     Threats (Informative)      
       10.1     Passive attack       
       10.2     Denial-of-Service attacks  
       10.3     Man-in-the-Middle attacks           
       10.4     Guessing attacks   
       10.5     Unencrypted gatekeeper half-key