classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018

Secure communication technology
April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security

Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also being the target. Resistance to cyber-attacks is thus becoming an important factor to look at when selecting the appropriate video surveillance system.

Some models of Panasonic’s i-PRO series cameras ship with digital certificates preinstalled, and can encrypt communications, detect alteration, and prevent spoofing right after being set up. By equipping systems with data encryption functions, countermeasures against data leakage can be performed end-to-end.

This white paper explains i-PRO series security functions of communications encryption and falsification detection using digital certificates as well as data ciphers.

1. Cipher technology and certificates

Ciphers, digital signatures, and digital certificates are some of the basic technologies of cyber security.

1.1. Cipher technology

Encryption means to rearrange information of text and digital data following set rules to prevent the content from being understood by third parties. Modern encryption is usually separated into algorithms that are exchanged and data called keys applied to those algorithms, with just the key ordinarily kept secret. Cipher systems are classified into two major types according to properties of the keys and how they are used.

• Symmetric-key cryptography

• Public-key cryptography

Symmetric-key cryptography can be compared to a house key, with the key for encryption and the key for decryption being the same. In cyberspace, data can be snooped on relatively easily in a communication path, so how to share the key between the sender and receiver becomes an issue. DES, 3DES, RC4, and AES are examples of cryptography using the symmetric-key cryptography system, and they usually have higher speeds compared with public-key cryptography.

Figure 1. Symmetric-key cryptography.
Figure 1. Symmetric-key cryptography.

Public-key cryptography uses a pair of different keys called a public key and a private key. Data encrypted by one of the keys can only be decrypted by the other key, and it is difficult to guess one key from the other key. The method of communication is by the receiver first generating a pair of keys and sending the public key to the sender. The sender uses the public key to encrypt the data to send, and the receiver decrypts the cipher text with the private key. Data encrypted by the public key can only be decrypted by the private key, so safe communications is possible unless the private key is leaked. This method does not require the private key to be shared, so the issue of key sharing with symmetric-key cryptography is overcome. RSA is an example of a cipher using the public-key cryptography system.

Figure 2. Public-key cryptography.
Figure 2. Public-key cryptography.

1.2. Digital signature

Digital signatures are technology to certify that data is created by the person it is purported to be from. (See Figure 3). Specifics of the certification method are as follows.

[At creation of data (signature)]

I. The data creator (sender) generates public and private keys and sends public key to receiver.

II. The creator calculates hash value (message digest).

III. The hash value is encrypted by creator’s private key. This is the digital signature.

IV. The digital signature is added to the data, and the data is sent to the receiver.

[At data verification (certification)]

I. The receiver calculates the hash value (A) of received data.

II. The receiver extracts the digital signature from received data and decrypts by the public key (B) received from creator.

III. If A and B are match, B is confirmed to be encoded by the private key known only by the creator, and the data is certified as being created by the creator.

Figure 3. Digital signature.
Figure 3. Digital signature.

1.3. Digital certificates

1.3.1. Overview of digital certificates

A digital certificate uses the aforementioned public-key cryptography and digital signature technologies, and it has the following three roles.

I. Storing the public key and the owner information of the private key paired with that.

II. Accreditation by a third party that the data is true.

III. Certification that the data is not falsified.

Certificates fulfil these roles by third parties digitally signing public keys and owner information.

1.3.2. Types of digital certificates

Digital certificates are classified into two major types according to who the signer is.

• CA-signed certificates

• Self-signed certificates

The following section explains the features and differences of those.

1.4. CA-signed certificates

1.4.1. Procedures for issuing CA-signed certificates

A CA-signed certificate is a digital certificate signed by a Certification Authority (CA) acknowledged to be socially correct. CA-signed certificates are ordinarily generated by the following procedure.

I. A pair of public and private keys is generated in the device.

II. A certificate-signing request (CSR) is generated in the device based on the pubic key and its owner information.

III. The device owner sends the CSR to the CA by means such as e-mail.

IV. The CA checks to see if information of the CSR received is correct.

V. If information is acknowledged to be correct, the CA’s private key is signed and a certificate is generated.

VI. The CA sends the certificate back to the device owner.

VII. The device owner installs the certificate to the device.

When installing CA certificates to security devices, the persons who set up those devices must conduct the procedure above for each device. Steps III to V take a few minutes to a few weeks, as described in the next section, leading to increased time-related costs in setting up.

1.4.2. Types of CA-signed certificates

CA-signed certificates are classified into the three types below according to the difference in examination method employed in step IV, above.

Digital signatures of certificates are screened by CAs acknowledged to be socially correct to verify the owner of the key, but care needs to be taken regarding the differences in the examination methods above.

With the lowest-costing domain validation, a certificate can be issued as long as the applicant has ownership rights to the domain (common name) noted on the certificate. A domain can be obtained by anyone for a few tens of US dollars a year and an ‘official’ CA certificate can be easily obtained even by someone with malicious intent. In actual online banking phishing, CA certificates obtained in this way are used to put on a show of being safe.

1.4.3. Trustworthiness of the CA itself

Digital signing of a CA-signed certificate is done by a private key owned by a CA, so if that private key should be leaked, all the certificates the CA signed in the past will no longer be trustworthy. For this reason, how the CA stores private keys needs to be noted. There have been cases in the past where private keys were leaked due to cyber-attack and unauthorised CA-signed certificates were issued. Certificate authorities deemed to be highly trustworthy put much time, effort, and money into preventing leakage.

1.5. Self-signed certificates

With a self-signed certificate, the digital certificate is signed by the device itself, not a third party. Ordinary methods of generation are as follows.

I. A pair of public and private keys is generated in the device.

II. A certificate-signing request (CSR) is generated in the device based on the pubic key and its owner information.

III. The CSR is signed by the aforementioned private key generated in the device.

Being able to sign by oneself allows examination by a third party to be omitted, so a certificate can be generated instantly and expenses for issuing are not incurred. But as there is no guarantee of the identity by a third party, there is no function to accredit that certificate information is true, one of the three roles in 1.3.1. This means that if a person with malicious intent intercepts the certificate when it is being sent to the other party and replaces that with another self-signed certificate, there is no way to verify it, so there is risk of spoofing.

Self-signed certificates should only be used for encrypted communications if the identity of the data sender is guaranteed by another method. Many video surveillance system devices have a function to generate self-signed certificates, but caution is needed because this point is not often explained.

1.6. Selecting a certificate

As shown, the roles of digital certificates of storing public key and owner information and of preventing falsification of content written in the certificate are the same for all types of certificates, but trustworthiness varies greatly between digital certificates in the role of certifying the owner. In order to prevent spoofing with network cameras, organisation validation certificate or stronger CA-signed certificates should be introduced; however, it takes time to issue those certificates and the price is high. Moreover, installing a certificate for each camera when tens to hundreds of network cameras are to be set up leads to an increase in costs.

2. Preinstalled certificate with Panasonic i-PRO series cameras

Some models of Panasonic i-PRO series cameras will ship with certificates preinstalled at time of manufacture, starting in April 2016. That way, customers who purchase those devices will be able to use various security functions that employ certificates right away without having to go through the process of issuing certificates at time of setup.

With i-PRO cameras with the Secure function, private and public keys are generated at manufacture in the factory and certificates installed at the factory. As there is no way to obtain the private key from the camera externally, there is no risk of the private key being leaked. Also, certificates are signed by a trusted third party, and the private key used for signing is managed strictly by the authority.

As for examination at time of issuing certificates, only certificates for which a request for issuing is appropriately made at manufacture in a Panasonic factory are signed, and stringent measures are taken to prevent unauthorised issuing of certificates. In order to identify certificates issued in this manner, special root CA certificates (digital certificates owned by certificate signer) are used. These root CA certificates are only signed for Panasonic video surveillance system devices, so spoofing can be easily uncovered when the root CA certificate is checked.

3. Panasonic’s secure functions

3.1. SSL/TLS communications

Currently, much communications between video surveillance system devices (for example, network cameras) and clients (PCs, recorders, mobile terminals) is by unencrypted plain text. If packets flowing in switching hubs, routers, and the like between servers and clients can be observed, the content of the communications can easily be snooped on. This includes not just the video data in the communications, but also the IDs/passwords for logging into the cameras, so persons with malicious intent can easily take control of the cameras if they can get inside.

And by altering the path information and packets themselves, it would be possible to spoof the server. Such problems are solved by using digital certificates preinstalled in i-PRO cameras and communicating by SSL/TLS. Things that can be done by SSL/TLS communications are as follows.

3.1.1. Protection of contents of communications

With SSL/TLS communications, the client first receives a certificate from the server, and the private value that the common key is based on is encoded by the public key included in the certificate. That value is then sent to the server, and the server extracts the common key from the value decrypted by the private key only the server has. Afterward, data to be transmitted based on this common key is encrypted and transmitted. For that reason, even if packets are observed by someone on the transmission path with malicious intent, the data cannot be understood by parties who do not have the private key. SSL/TLS communications can be achieved by entering ‘https://’ in the address bar of a browser.

3.1.2. Guarantee that communications is with the correct server

Next, we explain the mechanism for guaranteeing that the party being communicated with is correct. Judgment of whether or not the party being communicated with is correct is done by signing of a certificate received from the server at start of SSL/TLS communications. As explained in 2.4, what Certificate Authority is signed by is very important.

First of all, with a self-signed certificate, signing is done by oneself, so no identify confirmation can be done. Therefore, spoofing cannot be prevented. And with CA-signed certificates, CA identity and evaluation method need to be confirmed well, and spoofing cannot be prevented with some signers.

On the other hand, i-PRO cameras preinstalled certificates are signed by a highly trustworthy method as explained in three, so spoofing cannot be done. In this way, conducting SSL/TLS communications using preinstalled certificates with i-PRO cameras provides two kinds of safety in that eavesdropping on the communications path and spoofing of devices are prevented.

3.2. Detecting falsification

Another way of using certificates is to prevent falsification of video and audio data recorded by cameras. Data recorded directly to an SD card or other media from the camera and exported data of recordings by recorders can be falsified when carrying the media. In using recorded data as evidence, the need to prove that data is not falsified is an issue.

That issue is solved by using certificates preinstalled in i-PRO cameras. First, recording data is signed by the private key in the camera when recording video on the SD memory card. When detecting falsification after that data is transported, the camera’s certificate is input in advance and signing is verified by the public key included in the certificate. If verified to be correct, the data is proven not to be falsified.

Detection of falsification can be done by signing when the recorder or other recording device receives the data, but detection is not possible if falsification was done between the camera and recorder in this case. For that reason, it is important to sign within the camera.

Also, there is a risk of spoofing in detection of falsification as well with some types of certificates. For example, if someone with malicious intent falsifies data while it is being transported and signs the data with their own certificate and then replaces the original certificate with their own, signing is successfully verified and it is judged that there is no falsification. With certificates preinstalled in i-PRO cameras, a root CA certificate is unique, so by confirming the signer of the certificate, it is known that the certificate was signed within the camera, thereby preventing spoofing.

In this way, detecting falsification using preinstalled certificates with i-PRO cameras provides two kinds of safety in that falsification of recorded data and spoofing of signed devices are prevented.

3.3. Data cipher

With network camera systems, there is risk of private information being leaked due to incidents such as video data from the network stream being eavesdropped on and loss or theft of media on which video is recorded, but video data is encrypted with Panasonic i-PRO cameras to protect from such threats.

3.3.1. Stream protection

The H.264 stream, which is video data, is encrypted in real time and delivered by a network. Video is encrypted by the network camera that generates it, so the video cannot be viewed even if the communications route to connected devices is eavesdropped on. Unlike with SSL/TLS communications, video data is encrypted, so data can be transferred by ordinary video data communications protocols (RTP, etc.) without relying on the communications protocol. Also, special equipment does not have to be equipped to the connected devices.

3.3.2. Recorded data protection

Panasonic i-PRO cameras can record video data to SD cards in H.264 format, and recording encrypted video data is possible. Even if the SD card in use is stolen or a stored SD card is lost, third parties will not be able to view the video even if they play back MP4 files on the SD card if the data is encrypted. (Authorised viewers can play back video with a dedicated viewer after being authenticated.)

And in a system configuration where video data is recorded on a recorder, server, or other recording device, encrypted data can be generated even if the recording device does not have an encryption function by encrypting video data by the network camera. There is no need to decrypt in the interval from generating and encrypting video data on the network camera to saving to a recording device, and the data is constantly encrypted, so there is no risk of decrypted video leaking from the recording device even if the recording device is infected by a virus or comes under cyber-attack.

3.3.3. Encryption method

Encryption is by a high-speed cipher system that combines a secret sharing scheme using a Panasonic proprietary high-speed algorithm with a symmetric-key cryptography system. Strength of cipher

Unlike simple cipher systems made lightweight for embedded devices, the cipher has strength equal to or greater than ordinary symmetric-key cryptography systems. The secret sharing scheme has computationally security greater than AES-256 bit, and by combining a symmetric-key cryptography system that uses key length of 256 bits, cipher strength is equal to or greater than AES-256 bit. Load

Processing load is reduced compared with ordinary symmetric-key cryptography systems (AES-256 bit), so delay due to encryption is miniscule (see Figure 4). Theoretically, greater reduction effects can be expected the more the data volume increases due to high bit rate and high resolution, so this can be applied to 4K cameras as well.

And in contrast to encryption processing by connection destination when encrypting by communications protocol, there is no increase in encryption load when encoding video data, even if the number of videos distributed increases (at the same resolution).

Figure 4. Encryption processing time (calculated for WV-SPN631).
Figure 4. Encryption processing time (calculated for WV-SPN631).

4. Conclusion

As previously noted, there are potentially many threats to video surveillance systems, such as eavesdropped and falsification of data and spoofing of devices, and resistance to those threats will probably become even more important in the future with advances in IoT. Panasonic is continuously working to improve security to achieve a safe and secure society from the perspective of cybersecurity by quickly identifying and overcoming those threats.

To download the full white paper, go to*pvss1

For more information, contact Franz Kersten, Panasonic South Africa, +27 (0)11 312 7015,

  Share via Twitter   Share via LinkedIn      

Further reading:

  • ASIS Security Technology Concepts day
    April 2019, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management
    ASIS SA kicked the tyres of a few technologies at its first Security Technology Concepts day in February.
  • Is everything-as-a-service worth it?
    April 2019, iPulse Systems, Verifier, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Security-as-a-service seems like a good idea to reduce technology and labour expenses. Hi-Tech Security Solutions find out more.
  • Watching the game
    April 2019, Technews Publishing, Pelco by Schneider Electric, Dallmeier Electronic Southern Africa , Entertainment and Hospitality (Industry), CCTV, Surveillance & Remote Monitoring
    Video surveillance plays a larger role in the casino market than simply watching people gambling and trying to catch pickpockets.
  • Visible light facial recognition
    April 2019, ZKTeco, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    ZKTeco recently expanded its reach in the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products.
  • 2019 Internet of Things (IoT) Barometer
    March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
  • Video observation in the hotel industry
    March 2019, Dallmeier Electronic Southern Africa , Entertainment and Hospitality (Industry), CCTV, Surveillance & Remote Monitoring
    The best is just good enough: Hamburg's new luxury hotel The Fontenay relies on video security technology from Dallmeier.
  • 2 MP Starlight fixed camera
    April 2019, Longse Distribution, Products, CCTV, Surveillance & Remote Monitoring
    With the help of the Longse Starlight cameras, darkness becomes visible and your properties can always be kept under control.
  • When cybercrime affects health and safety
    April 2019, This Week's Editor's Pick, Cyber Security
    The threat of a category-one cyber-attack is that everything could seem right – the readings on the meter could be fine, checklists would be followed, and equipment would work – yet danger could still unfold.
  • Cathexis wraps up successful national roadshow
    April 2019, Cathexis Technologies, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News, Conferences & Events, Training & Education
    Cathexis Technologies successfully concluded its national CathexisVision Roadshow. With events held in Durban, Port Elizabeth, Johannesburg and Cape Town.
  • Milestone Systems launches Milestone Marketplace
    April 2019, Milestone Systems, This Week's Editor's Pick
    Milestone Systems introduces Milestone Marketplace, a digital platform for the video technology industry that connects buyers and sellers to co-create solutions.
  • Biodegradable security seals for SA
    April 2019, TruSeal, This Week's Editor's Pick, Asset Management, EAS, RFID, News, Security Services & Risk Management
    The new TruSeal product extension is produced from a special biodegradable material sourced from Malaysia.
  • Cam Era signs first franchisee
    April 2019, Technews Publishing, News, CCTV, Surveillance & Remote Monitoring
    After announcing the launch of its franchise business opportunity last year (, Cam Era has announced the signing of its first franchisee.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.