sg16-avd
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1998 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1997 -----
- December
- November
- October
- September
- August
January 1998
- 26 participants
- 64 discussions
Dear All,
Is it correct that an MCU just act as a Q.931 USER but not a Q.931
NETWORK? Thanks!
Best Regards,
Vincent Chen
E-mail:VincentSHChen@acer.com.tw
2
1
Hi SG16/WP2/Q13 Participants:
The following paper is presented detailing a possible architecture for
Gatekeeper-to-Gatekeeper communication.
An Ad-Hoc meeting took place on Room-III at 8:30 AM on the Jan 29 Geneva
ITU Meeting. I will compile a list of
requirements brought up in that meeting soon.
Please note that we present this document to provide some overview and
possible solutions to the problems. This
is in not way or form the only way to solve the problems, it is only one of
the possible solutions.
We solicit your input about:
=======================
1. Requirements
2. Which of the requirements are for H.323v3 work, and which are for
further study
3. Required services and Goals
4. Open Issues
Points that were raised in the meeting:
================================
1. Build networks that scale to the Internet
2. allow for both flat, tree and network models
3. provide a method for a gatekeeper to find an Entity that is registered
with another gatekeeper
4. Support call-record logging, accounting, and possibly billing (probably
as liaison to appropriate working parties)
Thank you for your time,,
Gur Kimchi,
VocalTec Communications Ltd.
(See attached file: TD-InterGatekeeper.doc)
1
0
The ftp and www server "standard.pictel.com" will be shut down for up to
four hours this Thursday, 29 January starting at about 6 PM US Eastern
time. The system hardware will be upgraded at that time (from a 10-or-so
MIP SPARCstation 1 to a SPARC IPX with an accelerated CPU chip).
Services will resume normally once the upgrade is completed.
Bob Webber
PictureTel Corporation
1
0
May be, we can just use random instead of timestamps as described below.
1) EPA would send "generalID_A, random_A" to EPB (unauthenticated).
2) EPB would send "generalID_B, random_B" to EPA (unauthenticated).
3) In the cryptotoken, EPA would send "random_B, generalID_x, (random_B, generalID_x)f", where generalID_x could be either generalID_A or generalID_B, and (...)f is the appropriate hash/encrypting function. random_B and generalID_x need not even be sent in the clear in the cryptotoken.
This would get rid of the replay attack problem and also the problem of dealing with time skews.
- Senthil
Senthil Sengodan
Nokia Research Center
----------
From: Mailing list for parties associ
To: ITU-SG16
Subject: Re: H.235 Comments
Date: Tuesday, January 27, 1998 12:12PM
Such an attack can be made even when there is only one GK, but it is more
"reasonable" to attack a different GK. I think the best solution is to
include both IDs (A & B) in the token, contrary to what you say, I don't
see any hint to that in the standard itself (there's no room for two IDs).
LiorM
-------- On 01/26/98 03:06 PM Pekka.Pessi(a)research.nokia.com wrote:
"EXT Lior Moscovici" <Lior_Moscovici(a)VOCALTEC.COM> writes:
>Here are some comments on the last H.235 draft:
> They following relate to the authentication scheme in 10.3:
> In 10.3: We think it would be more appropriate that the party that
> proves its identity send its own ID in the authentication token, rather
> that the ID of the authenticating party. In other words, in the
> diagrams, EP A would rather send a token containg generalID_A, rather
> than generalID_B, and vice versa.
ISO/IEC 9898-2 notes:
Distinguishing idenitifier B [generalID_B] is included in the token AB
[token sent from A to B] to prevent the re-use of TokenAB on entity A by an
adversary masquerading as entity B. ... Their [generalID] inclusion is
made
optional so that, in environments where such attacks cannot occur, one or
both may be omitted.
I can imagine some scenarios, where such attacks are possible.
Let's suppose there are two gatekeepers, B and C, which use the
same
passwords to authenticate terminals. Terminal A sends an
authorisation token to B. Now, if the generalID_B is not included
in the token, an eavesdropper can send the same token to C.
Pekka Pessi
1
0
Subscription-based authentication mechanisms described in 10.3 in H.235
assume a common reliable source of time stamps to be included in the token.
The validator accepts a limited difference between the timestamp included
in the token and the current time. For unaccepted time diffs, it might be
to convey the time diff itself to the party that sent the token, so that it
can regulate the skew, and generate a new token with the correct time.
We propose to include the time diff in a ClearToken sent along with the xRJ
with the SecurityDenial reason. The clear token should contain the time
diff in the TimeStamp field, and the ID of the party that generaied the
token.
Lior
1
0
Such an attack can be made even when there is only one GK, but it is more
"reasonable" to attack a different GK. I think the best solution is to
include both IDs (A & B) in the token, contrary to what you say, I don't
see any hint to that in the standard itself (there's no room for two IDs).
LiorM
-------- On 01/26/98 03:06 PM Pekka.Pessi(a)research.nokia.com wrote:
"EXT Lior Moscovici" <Lior_Moscovici(a)VOCALTEC.COM> writes:
>Here are some comments on the last H.235 draft:
> They following relate to the authentication scheme in 10.3:
> In 10.3: We think it would be more appropriate that the party that
> proves its identity send its own ID in the authentication token, rather
> that the ID of the authenticating party. In other words, in the
> diagrams, EP A would rather send a token containg generalID_A, rather
> than generalID_B, and vice versa.
ISO/IEC 9898-2 notes:
Distinguishing idenitifier B [generalID_B] is included in the token AB
[token sent from A to B] to prevent the re-use of TokenAB on entity A by an
adversary masquerading as entity B. ... Their [generalID] inclusion is
made
optional so that, in environments where such attacks cannot occur, one or
both may be omitted.
I can imagine some scenarios, where such attacks are possible.
Let's suppose there are two gatekeepers, B and C, which use the
same
passwords to authenticate terminals. Terminal A sends an
authorisation token to B. Now, if the generalID_B is not included
in the token, an eavesdropper can send the same token to C.
Pekka Pessi
1
0
Hello, security people,
Here are some comments on the last H.235 draft:
They following relate to the authentication scheme in 10.3:
In 10.3: We think it would be more appropriate that the party that
proves its identity send its own ID in the authentication token, rather
that the ID of the authenticating party. In other words, in the
diagrams, EP A would rather send a token containg generalID_A, rather
than generalID_B, and vice versa.
In Hash & Encryption-based authentication schemes - we propose to add
the ID also in the clear part of the token, so that the authenticating
party can know who to authenticate.
There is an inconsistency between the CryptoToken defintion of H.235,
and the one in H.225.0, (named CryptoH323Token). To settle all this, and
also incorporate (1) & (2) above, we propose the following ASN.1 for
that, based on the H.225.0 definition:
CryptoH323Token::= CHOICE
{
cryptoEPPwdHash SEQUENCE
{
timeStamp TimeStamp, -- timestamp used in hash
token HASHED { EncodedPwdCertToken ?- generalID set
to ?alias? -- }
},
cryptoGKPwdHash SEQUENCE
{
gatekeeperId GatekeeperIdentifier, -- GatekeeperID of GK
generating hash
timeStamp TimeStamp, -- timestamp used in hash
token HASHED { EncodedPwdCertToken -- generalID set
to Gatekeeperid -- }
},
cryptoEPPwdEncr SEQUENCE
{
alias AliasAddress, -- alias of encrypting entity
token ENCRYPTED
{ EncodedPwdCertToken ?- generalID set to alias --}
},
cryptoGKPwdEncr SEQUENCE
{
gatekeeperId GatekeeperIdentifier, -- GatekeeperID of
encrypting GK
token ENCRYPTED
{ EncodedPwdCertToken ?- generalID set to gatekeeper ID --}
},
cryptoEPCert SIGNED { EncodedPwdCertToken ?- generalID set to
Gatekeeperid -- },
cryptoGKCert SIGNED { EncodedPwdCertToken ?- generalID set to
alias -- },
cryptoFastStart SIGNED { EncodedFastStartToken },
nestedcryptoToken CryptoH323Token,
...
}
Lastly, H.235 mentions nothing about the RAS Integrity Check mechanism
specified in H.225.0. We think it is appropriate to specifiy it also in
H.235.
LiorM
2
1
ÐÏࡱá>þÿ ^`þÿÿÿ[\]zvüqñÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿì¥ÁY ¿wMbjbjóWóW &==^) wÿÿÿÿÿÿ]999
9ò9îà>|?dà?à?à?à?°@4ÄAà?ÞÄvDNÄHp4I4IÀôJôJZdh^4ÌÎÎÎ'õLAL$¢ô±-9T`ÂôJôJ^b,c±>99ôJôJìC>>>"d¶9ôJ9ôJÌà?à?9999`Ì>þ><þÁó99ÌôJPCàJœLç)œà?à?Øuf
Ž
INTERNATIONAL TELECOMMUNICATION UNIONTELECOMMUNICATIONSTANDARDIZATION SECTOR
STUDY PERIOD 1997 -2000COM 16- -E
September 1997
Original: English
Question 14/16
STUDY GROUP 16 - CONTRIBUTION
SOURCE* : RAPPORTEUR FOR Q.14/16 (Gary THOM)
TITLE: PROPOSED RECOMMENDATION H.235
__________
Summary
This contribution provides the text for draft Recommendation H.235 Security and encryption for H series (H.323 and other H.245 based) multimedia terminals which is an editorially refined version of the one determined at the SG16 meeting in March 1997.
This Recommendation describes enhancements within the framework of the ITU H.3(XX) specification series, to incorporate security services such as Authentication and Privacy (data encryption). The proposed scheme is applicable to both simple point-to-point and multi-point conferences for any terminals which utilize H.245 as a control protocol.
It is proposed that this draft be decided at the January-February 1998 meeting of SG16.
* Contact: Jim Toga Tel.: +1 (503) 264-8816
Intel Corporation Fax: +1 (503) 264-3485
Santa Clara, USA E-mail: jtoga(a)ibeam.intel.com
INTERNATIONAL TELECOMMUNICATION UNION
ITU-T H.235
TELECOMMUNICATION (January 1998)STANDARDIZATION SECTOR OF ITU
LINE TRANSMISSION OF NON-TELEPHONESIGNALS
Security and Encryption for H Series (H.323 and other H.245 based) multimedia terminals
DRAFT ITU-T Recommendation H.235
FOREWORD
The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the International Telecommunication Union. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis.
The World Telecommunication Standardization Conference (WTSC), which meets every four years, established the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics.
ITU-T Recommendation H.235 was prepared by the ITU-T Study Group 16 (199x-199x) and was approved by the WTSC (Place, Month xx-xx, 199x).
___________________
ãð ITU 199x
All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU.
SUMMARY
This Recommendation describes enhancements within the framework of the ITU H.3(XX) specification series, to incorporate security services such as Authentication and Privacy (data encryption). The proposed scheme is applicable to both simple point-to-point and multi-point conferences for any terminals which utilize H.245 as a control protocol.
For example, H.323 systems operate over packet based networks which do not provide a guaranteed Quality of Service. For the same technical reasons that the base network does not provide QOS, the network does not provide a secure service. Secure real-time communication over insecure networks generally involves two major areas of concern authentication and privacy.
This Recommendation describes the security infrastructure and specific privacy techniques to be employed by the H.3(XX) series of multimedia terminals. This document will cover areas of concern for interactive conferencing. These areas include, but are not strictly limited to authentication, privacy of all real-time media streams that are exchanged in the conference. This Recommendation provides the protocol and algorithms needed between the H.323 entities.
H.235 utilizes the general facilities supported in H.245 and as such, any standard which operates in conjunction with this control protocol may use this security framework. It is expected that wherever possible other H.series terminals may interoperate and directly utilize the methods described in this document. This document will not initially provide for complete implementation in all areas, and will specifically highlight endpoint authentication and media privacy.
This recommendation includes the ability to negotiate services and functionality in a generic manner, and to be selective concerning cryptographic techniques and capabilities utilized. The specific manner in which they are used, relates to systems capabilities, application requirements and specific security policy constraints. This recommendation supports varied cryptographic algorithms, with varied options appropriate for different purposes; e.g. key lengths. Certain cryptographic algorithms may be allocated to specific security services (e.g. one for fast media stream encryption and another for signalling encryption).
It should also be noted that some of the available cryptographic algorithms or mechanisms may be reserved for export or other national issues (e.g. with restricted key lengths). The recommendation supports signalling of well-known algorithms in addition to signalling non-standardized or proprietary cryptographic algorithms. There are no specifically mandated algorithms, however it is strongly suggested that endpoints support as many of the applicable algorithms as possible in order to achieve interoperability. This parallels the concept that the support of H.245 does not guarantee the interoperability between two entities codecs.
TOC \* MERGEFORMAT 1. Scope PAGEREF _Toc410402794 \h 1
2. Normative references PAGEREF _Toc410402795 \h 1
3. Definitions PAGEREF _Toc410402796 \h 3
4. Symbols and abbreviations PAGEREF _Toc410402797 \h 4
5. Conventions PAGEREF _Toc410402798 \h 5
6. System Introduction PAGEREF _Toc410402799 \h 6
6.1 Summary PAGEREF _Toc410402800 \h 6
6.2 Authentication PAGEREF _Toc410402801 \h 6
6.2.1 Certificates PAGEREF _Toc410402802 \h 6
6.3 Call Establishment Security PAGEREF _Toc410402803 \h 7
6.4 Call Control (H.245) Security PAGEREF _Toc410402804 \h 7
6.5 Media Stream Privacy PAGEREF _Toc410402805 \h 7
6.6 Trusted Elements PAGEREF _Toc410402806 \h 8
6.6.1 Key Escrow PAGEREF _Toc410402807 \h 8
6.7 NonRepudiation PAGEREF _Toc410402808 \h 8
7. Connection Establishment Procedures PAGEREF _Toc410402809 \h 9
7.1 Introduction PAGEREF _Toc410402810 \h 9
8. H245 Signalling AND PROCEDURES PAGEREF _Toc410402811 \h 9
8.1 Secure H.245 Channel Operation PAGEREF _Toc410402812 \h 9
8.2 Unsecured H.245 Channel Operation PAGEREF _Toc410402813 \h 10
8.3 Capability Exchange PAGEREF _Toc410402814 \h 10
8.4 Master role PAGEREF _Toc410402815 \h 10
8.5 Logical Channel Signalling PAGEREF _Toc410402816 \h 10
9. Multipoint Procedures PAGEREF _Toc410402817 \h 11
9.1 Authentication PAGEREF _Toc410402818 \h 11
9.2 Privacy PAGEREF _Toc410402819 \h 11
10. Authentication Signalling AND PROCEDURES PAGEREF _Toc410402820 \h 11
10.1 Introduction PAGEREF _Toc410402821 \h 11
10.2 Diffie-Hellman with optional Authentication PAGEREF _Toc410402822 \h 11
10.3 Subscription Based Authentication PAGEREF _Toc410402823 \h 12
10.3.1 Introduction PAGEREF _Toc410402824 \h 12
10.3.2 Password with symmetric encryption PAGEREF _Toc410402825 \h 12
10.3.3 Password with hashing PAGEREF _Toc410402826 \h 13
10.3.4 Certificate based with signatures PAGEREF _Toc410402827 \h 13
11. Media Stream Encryption Procedures PAGEREF _Toc410402828 \h 14
11.1 Media Session Keys PAGEREF _Toc410402829 \h 14
12. Security Error Recovery PAGEREF _Toc410402830 \h 15
1. Scope
The primary purpose of this Recommendation is to provide for authentication, privacy, and integrity within the current H series protocol framework. The current text of this document (1998) provides details on implementation with H.323. This framework is expected to operate in conjunction with other H series protocols that utilize H.245 as their control protocol.
Additional goals in this recommendation include:
Security architecture should be developed as an extensible and flexible framework for implementing a security system for H series terminals. This should be provided through flexible and independent services and the functionality that they supply. This includes the ability to negotiate and be selective concerning cryptographic techniques utilized, and the manner in which they are used.
Provide security for all communications occurring as a result of H.3xx protocol usage. This includes aspects of connection establishment, call control, and media exchange between all entities. This requirement includes the use of confidential communication (privacy), and may exploit functions for peer authentication as well as protection of the users environment from attacks.
This recommendation should not preclude integration of other security functions in H.3xx entities which may protect them against attacks from the network.
This recommendation should not limit the ability for any H.3xx series to scale as appropriate. This may include both the number of secured users and the levels of security provided.
Where appropriate, all mechanisms and facilities should be provided independent of any underlying transport or topologies. Other means that are outside the scope of H.235 may be required to counter such threats.
Provisions are made for operation in a mixed environment (secured and unsecured entities)
This recommendation should provide facilities for distributing session keys associated with the cryptography utilized. (This does not imply that public-key based certificate management must be part of H.235).
The security architecture, described in this Recommendation, does not assume that the participants are familiar with each other. It does however assume that appropriate precautions have been taken to physically secure the H series endpoints. The principal security threat to communications, therefore, is assumed to be eavesdropping on the network or some other method of diverting media streams.
The 1996 H.323 standard provides the means to conduct an audio, video and data conference between two or more parties, but does not provide the mechanism to allow each participant to authenticate the identity of the other participants, nor provide the means to make the communications private. (i.e., encrypt the streams).
H.323, H.324, H.310, H.324M make use of the logical channel signalling procedures of Recommendation H.245, in which the content of each logical channel is described when the channel is opened. Procedures are provided for expression of receiver and transmitter capabilities, transmissions are limited to what receivers can decode, and receivers may request a particular desired mode from transmitters. The security capabilities of each endpoint are communicated in the same manner as any other communication capability.
Some H series (H.323) terminals may be used in multipoint configurations. The security mechanism described in this document will allow for secure operation in these environments including both centralized and decentralized MCU operation.
2. Normative references
The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; all users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published.
[1] ITU-T Recommendation H.323 (1998): Packet Based Multimedia Communications Systems
[2] ITU-T Recommendation H.225.0 (1998): " Call Signaling Protocols and Media Stream Packetization for Packet Based Multimedia Communications Systems ".
[3] ITU-T Recommendation H.245 (1998): "Control Protocol for Multimedia Communication ".
[4] ITU-T Recommendation Q.931 (1993): "Digital Subscriber Signalling System No. 1 (DSS 1) - ISDN User-Network Interface Layer 3 Specification for Basic Call Control".
[5] ITU-T Recommendation X.509: The directory-authentication framework
[6] CCITT Recommendation X.800 (1991), Security Architecture for Open Systems Interconnection for CCITT applications.
(ISO 74982:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture.)
[7] ITU-T Recommendation X.803 (1994) | ISO/IEC 10745:1995, Information technology Open Systems Interconnection Upper layers security model.
[8] ITU-T Recommendation X.810 (1995) | ISO/IEC 10181-1:1996, Information technology Open Systems Interconnection Security frameworks for open systems: Overview.
[9] ITU-T Recommendation X.811 (1995) | ISO/IEC 10181-2:1996, Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework.
[10] ISO/IEC 9798-2:1994, Information technology Security techniques Entity authentication. Mechanisms using symmetric encipherment algorithms
[11] ISO/IEC 9798-3:1993, Information technology Security techniques Entity authentication using public key algorithm.
[12] ISO/IEC 9798-4:1995, Information technology Security techniques Entity authentication. Mechanisms using a cryptographic check function
[13] Internet Engineering Task Force, 1996 Security Architecture for the Internet Protocol, RFC 1825, RP. Atkinson
Internet Engineering Task Force, 1997 Keyed-Hashing for Message Authentication, RFC 2104, H. Krawczyk, M. Bellare, and R. Canetti
3. Definitions
For the purposes of this Recommendation the definitions given in section 3 of H.323, H.225.0, and H.245 apply along with those in this section. Some of the following terms are used as defined in CCITT Rec. X.800 | ISO 7498-2 and X.803, X.810 and X.811:
access control: The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner (X.800).
authentication: The provision of assurance of the claimed identity of an entity (X.811).
authentication: The granting of permission on the basis of authenticated identification.
attack: The activities undertaken to bypass or exploit deficiencies in a systems security mechanisms. By a direct attack on a system they exploit deficiencies in the underlying algorithms, principles, or properties of a security mechanism. Indirect attacks are performed when they bypass the mechanism, or when they make the system use the mechanism incorrectly.
certificate: A set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for the data (X.810). In this recommendation the term refers to public key certificates which are values that represent an owners public key (and other optional information) as verified and signed by a trusted authority in an unforgeable format.
cCipher: A cryptographic algorithm, a mathematical transform.
confidentiality: The property that prevents disclosure of information to unauthorized individuals, entities, or processes.
cryptographic algorithm: Mathematical function that computes a result from one or several input values using a secret parameter (e.g. a key).
encipherment : Encipherment (encryption) is the process of making data unreadable to unauthorized entities by applying a cryptographic algorithm (an encryption algorithm). Decipherment (decryption) is the reverse operation by which the ciphertext is transformed to the plaintext.
integrity: The property that data has not been altered in an unauthorized manner.
key management: The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy (X.800).
media stream: A media steam can be of type audio, video or data or a combination of any of them. Media stream data conveys user or application data (payload) but no control data.
Nnonrepudiation: Protection from denial by one of the entities involved in a communication of having participated in all or part of the communication
Pprivacy: A mode of communication in which only the explicitly enabled parties can interpret the communication. This is typically achieved by encryption and shared key(s) for the cipher.
pPrivate channel: For this document, a private channel is one that is a result of prior negotiation on a secure channel. In this context it may be used to handle media streams.
pPublic kKey cCryptography: An encryption system utilizing asymmetric keys (for encryption/decryption) in which the keys have a mathematical relationship to each other - which cannot be reasonably calculated.
symmetric (secret-key based) cryptographic algorithm: An algorithm for performing encipherment or the corresponding algorithm for performing decipherment in which the same key is required for both encipherment and decipherment (X.810).
threat: A potential violation of security (X.800).
4. Symbols and abbreviations
For the purposes of this Recommendation, the following symbols and abbreviations apply.
CBC: Cipher Block Chaining
CFB: Cipher Feedback
DSS: Digital Signature Standard
ECB: Electronic Code Book
IPSEC: Internet Protocol Security
ISAKMP: Internet Security Association and Key Management Protocol
OFB: Output Feedback
QoOS: Quality of Service
RSA: Rivest, Shamir and Adleman (public key algorithm)
SDU: Service Data Unit
TLS: Transport Level Security
5. Conventions
In this document the following conventions are used:
"Shall" indicates a mandatory requirement.
"Should" indicates a suggested but optional course of action.
"May" indicates an optional course of action rather than a recommendation that something take place.
References to Sections, Paragraphs, Annexes, and Appendices refer to those items within this Recommendation unless another document is explicitly listed. For example, Section 1.4 refers to section 1.4 of this Recommendation; H.245 Section 6.4 refers to section 6.4 in H.245.
{ To be refined for this recommendation - This Recommendation describes the use of n different message types: H.245, RAS, Q.931, etc. To distinguish between the different message types the following convention is followed. H.245 message and parameter names consist of multiple concatenated words highlighted in bold typeface (maximumDelayJitter). RAS message names are represented by three letter abbreviations (ARQ). Q.931 message names consist of one or two words with the first letters capitalized (Call Proceeding).}
6. System Introduction
6.1 Summary
The Call Signalling channel may be secured using TLS [TLS] or IPSEC [13/IPSEC] on a secure well-known port (H.225.0).
Users may be authenticated either during the initial call connection, in the process of securing the H.245 channel and/or by exchanging certificates on the H.245 channel.
The encryption capabilities of a media channel are determined by extensions to the existing capability negotiation mechanism.
Initial Distribution of key material from the Master is via H.245 OpenLogicalChannel or OpenLogicalChannelAck messages.
Re-keying may be accomplished by H.245 commands; EncryptionUpdateRequest and EncryptionUpdate.
Key material distribution is protected either by operating the H.245 channel as a private channel or by specifically protecting the key material using the selected exchanged certificates.
The security protocols presented either conform to ISO published standards or IETF proposed standards.
6.2 Authentication
The process of authentication verifies that the respondents are, in fact, who they say they are. Authentication may be accomplished in conjunction with the exchange of public key based Certificates. Authentication may also be accomplished by an exchange which utilizes a shared secret between the entities involved. This may be a static password or some other a priori piece of information
This Recommendation describes the protocol for exchanging the certificates, but does not specify the criteria by which they are mutually verified and accepted. In general, certificates give some assurance to the verifier that the presenter of the certificate is who he says he is. The intent behind the certificate exchange is to authenticate the user of the endpoint, not simply the physical endpoint. Using Digital Certificates, an authentication protocol proves that the respondents possess the private keys corresponding to the public keys contained in the certificates. This authentication protects against man-in-the-middle attacks, but does not automatically prove who the respondents are. To do this normally requires that there be some policy regarding the other contents of the certificates. For authorization certificates, for example, the certificate would normally contain the Service-Providers identification along with some form of user account identification prescribed by the Service Provider.
The authentication framework in this document does not prescribe the contents of certificates (i.e., does not specify a certificate policy) beyond that required by the authentication protocol. However, an application using this framework may impose high-level policy requirements such as presenting the certificate to the user for approval. This higher level policy may either be automated within the application or require human interaction.
For authentication which does not utilize digital certificates, this Recommendation provides the signalling to complete various challenge/response scenarios. This method of authentication requires prior coordination by the communicating entities so that a shared secret may be obtained. An example of this method would be a customer of a subscription based service.
As a third option, the authentication may be completed within the context of a separate security protocol such as TLS [TLS] or IPSEC [13/IPSEC].
Both bi-directional and unidirectional authentication may be supported by peer entities. This authentication may occur on some or all of the communication channels.
All of the specific authentication mechanisms described in this recommendation are identical to, or derived from ISO developed algorithms as specified in references [10-12] or based on IETF protocols
6.2.1 Certificates
The standardization of certificates, including their generation, administration and distribution is outside the scope of this document. The Certificates used to establish secure channels (call signalling and/or call control) shall conform to those prescribed by whichever protocol has been negotiated to secure the channel.
It should be noted that for authentication utilizing public key certificates, the endpoints are required to provide digital signatures using the associated private key value. The exchange of public key certificates alone does not protect against man in the middle attacks. The H.235 protocols conform to this requirement.
6.3 Call Establishment Security
There are at least two reasons to motivate securing the call establishment channel (e.g. H.323 using Q.931). The first is for simple authentication, before accepting the call. The second reason is to allow for call authorization. If this functionality is desired in the H Series terminal, a secure mode of communication should be used (such as TLS/IPSEC for H.323) before the exchange of call connection messages. Alternatively, the authorization may be provided based upon a service specific authentication. The constraints of a service specific authorization policy are outside the scope of this document.
6.4 Call Control (H.245) Security
The call control channel (H.245) should also be secured in some manner to provide for subsequent media privacy. The H.245 channel shall be secured using any negotiated privacy mechanism (this includes the option of none). H.245 messages are utilized to signal encryption algorithms and encryption keys used in the shared, private, media channels. The ability to do this, on a logical channel by logical channel basis, allows different media channels to be encrypted by different mechanisms. For example, in centralized multipoint conferences, different keys may be used for streams to each endpoint. This may allow media streams to be made private for each endpoint in the conference. In order to utilize the H.245 messages in a secure manner the entire H.245 channel (logical channel 0) should be opened in a negotiated secure manner.
The mechanism by which H.245 is made secure is dependent on the H series terminals involved. The only requirement on all systems that utilize this security structure is that each shall have some manner in which to negotiate and/or signal that the H.245 channel is to be operated in a particular secured manner before it is actually initiated. For example, H.323 will utilize the H.225.0 connection signalling messages to accomplish this.
6.5 Media Stream Privacy
This Recommendation describes media privacy for media streams carried on packet based transports. These channels may be uni-directional with respect to H.245 logical channel characterizations. The channels are not required to be uni-directional on a physical or transport level.
A first step in attaining media privacy should be the provision of a private control channel on which to establish cryptographic keying material and/or set up the logical channels which will carry the encrypted media streams. For this purpose, when operating in a secure conference, any participating endpoints may utilize an encrypted H.245 channel. In this manner, cryptographic algorithm selection and encryption keys as passed in the H.245 OpenLogicalChannel command are protected.
The H.245 secure channel may be operated with different characteristics than the private media channel(s) as long as it provides a mutually acceptable level of privacy. This allows for the security mechanisms protecting media streams and any control channels to operate in a completely independent manner, providing completely different levels of strength and complexity.
If it is required that the H.245 channel be operated in a non-encrypted manner, the specific media encryption keys may be encrypted separately in the manner signaled and agreed to, by the participating parties. A logical channel of type h235Control may be utilized to provide the material to protect the media encryption keys. This logical channel may be operated in any appropriately negotiated mode.
The privacy (encryption) of data carried in logical channels shall be in the form specified by the OpenLogicalChannel. Transport specific header information shall not be encrypted. The privacy of data is to be based upon end-to-end encryption.
6.6 Trusted Elements
The basis for authentication (trust) and privacy is defined by the terminals of the communications channel. For a connection establishment channel, this may be between the caller and a hosting network component. For example, a telephone trusts that the network switch will connect it with the telephone whose number has been dialed. For this reason, any entity which terminates an encrypted H.245 control channel or any encryptedData type logical channels shall be considered a trusted element of the connection; this may include MC(U)s and Gateways. The result of trusting an element is the confidence to reveal the privacy mechanism (algorithm and key) to that element.
Given the above, it is incumbent upon participants in the communications path to authenticate any and all trusted elements. This will normally be done by certificate exchange as would occur for the standard end to end authentication. This recommendation will not require any specific level of authentication, other than to suggest that it be acceptable to all entities using the trusted element. Details of a trust model and certificate policy are for further study.
Privacy can be assured between the two endpoints only if connections between trusted elements are proven to be protected against man in the middle attacks.
6.6.1 Key Escrow
Although not specifically required for operation, this recommendation contains provision for entities utilizing the H.235 protocol to support a key escrow, or key recovery technique within the signalling elements.
The ability to recover lost media encryption keys should be supported in installations where this functionality is desired or required.
6.7 NonRepudiation
FFS.
7. Connection Establishment Procedures
7.1 Introduction
As stated in the REF _Ref379881422 \* MERGEFORMAT 6. System Introduction section, both the call connection channel (H.225.0 for H.323 series) and call control (H.245) channel shall operate in the negotiated secured or unsecured mode starting with the first exchange. For the call connection channel, this is done a priori (for H.323 a TLS secured TSAP [port 1300] shall be utilized for the Q.931 messages). For the call control channel, security mode is determined by information passed in the initial connection setup protocol in use by the H series terminal.
In the cases in which there are no overlapping security capabilities, the called terminal may refuse the connection. The error returned should convey no information about any security mis-match the calling terminal will have to determine the problem by some other means. In cases where the calling terminal receives a connect acknowledgment message without sufficient security capabilities, it should terminate the call.
If the calling and called terminals have compatible security capabilities, it shall be assumed by both sides that the H.245 channel shall operate in the secure mode negotiated. Failure to set up the H.245 in the secure mode determined here should be considered a protocol error and the connection terminated.
8. H245 Signalling AND PROCEDURES
In general, the privacy aspects of media channels are controlled in the same manner as any other encoding parameter; each terminal indicates its capabilities, the source of the data selects a format to use and the receiver acknowledges or denies the mode. All transport independent aspects of the mechanism such as algorithm selection are indicated in generic logical channel elements. Transport specifics such as key/encryption algorithm synchronization are passed in transport specific structures.
8.1 Secure H.245 Channel Operation
Assuming that the connection procedures in the previous section ( REF _Ref379881553 \* MERGEFORMAT 7. Connection Establishment Procedures) indicate a secure mode of operation, the negotiated handshake and authentication shall occur for the H.245 logical channel before any other H.245 messages are exchanged. If negotiated, any exchange of certificates shall occur using any mechanism appropriate for the H series terminal(s). After completing the securing of the H.245 channel, the terminals use the H.245 protocol in the same manner that they would in an insecure mode.
8.2 Unsecured H.245 Channel Operation
Alternatively, the H.245 channel may operate in an unsecured manner and the two entities open a secure logical channel with which to perform authentication and/or shared-secret derivation. For example TLS or IPSEC may be utilized by opening a logical channel with the datatype containing a value for encryptionData. This channel could then be used to derive a shared secret which protects any media session keys or to transport the EncryptionSync.
8.3 Capability Exchange
Following the procedures in H.245 Section 8.3 - Capability Exchange Procedures, and the appropriate H series System Recommendation, endpoints exchange capabilities using H.245 messages. These capability sets may now contain definitions which indicated security and encryption parameters. For example, an endpoint might provide capabilities to send and receive H.261 video. It may also signal the ability to send and receive encrypted H.261 video.
Each encryption algorithm that is utilized in conjunction with a particular media codec, implies a new capability definition. As with any other capability, endpoints may supply both independent and dependent encrypted codecs in their exchange. This will allow endpoints to scale their security capabilities based upon overhead and resources available.
After capability exchange has been completed, endpoints may open secure logical channels for media in the same manner that they would in an insecure manner.
8.4 Master role
The H.245 master-slave is used to establish the master entity for the purpose of bi-directional channel operation and other conflict resolution. This role of master is also utilized in the security methods. Although the security mode(s) of a media stream is set by the source (in deference to the capabilities of the receiver), the master is the endpoint which generates the encryption key. This generation of the encryption key is done, regardless of whether the master is the receiver or the source of the encrypted media. In order to allow for multicast channel operation with shared keys, the MC (also the master) should generate the keys.
8.5 Logical Channel Signalling
Endpoints open secure media logical channels in the same manner that they open unsecured media logical channels. Each channel may operate in a completely independent manner from other channels - in particular where this pertains to security. The particular mode shall be defined in the OpenLogicalChannel dataType field. The initial encryption key shall be passed in either the OpenLogicalChannel or OpenLogicalChannalAck depending on the master/slave relationship of the originator of the OpenLogicalChannel.
The OpenLogicalChannelAck shall act as confirmation of the encryption mode. If the openLogicalChannel is unacceptable to the recipient either dataTypeNotSupported or dataTypeNotAvailable (transient condition) shall be returned in the cause field of the OpenLogicalChannelReject.
During the protocol exchange that establishes the logical channel, the encryption key shall be passed from the Master to the slave (regardless of who initiated the OpenLogicalChannel). For media channels opened by an endpoint (other than the Master), the Master shall return the initial encryption key and the initial synchronization point in the OpenLogicalChannelAck (in the encryptionSync field). For Media Channels opened by the Master the OpenLogicalChannel shall include the initial encryption key and the synchronization point in the encryptionSync field.
9. Multipoint Procedures
9.1 Authentication
Authentication shall occur between an endpoint and the MC(U) in the same manner that it would in a point to point conference. The MC(U) shall set the policy concerning level and stringency of authentication. As stated in section REF _Ref379881675 \n 0 the MC(U) is trusted; existing endpoints in a conference may be limited by the authentication level employed by the MC(U). New ConferenceRequest/ConferenceResponse commands, allow endpoints to obtain the certificates of other participants in the conference from the MC(U). As outlined in H.245 procedures, endpoints in a multipoint conference may request other endpoint certificates via the MC, but may not be able perform direct cryptographic authentication within the H.245 channel.
9.2 Privacy
MC(U) shall win all master/slave exchanges and as such shall supply encryption key(s) to participants in a multipoint conference. Privacy for individual sources within a common session (assuming multicast) may be achieved with individual or common keys. These two modes may be arbitrarily chosen by the MC(U) and shall not be controllable from any particular endpoint except in modes allowed by MC(U) policy. In other words, a common key may be used across multiple logical channels as opened from different sources.
10. Authentication Signalling AND PROCEDURES
10.1 Introduction
There are two types of authentication that may be utilized. The first type is symmetric encryption based that requires no prior contact between the communicating entities. The second type is based on the ability to have some prior shared secret (further referenced as subscription based). Two forms of subscription-based authentication are provided; password and certificate.
10.2 Diffie-Hellman with optional Authentication
The intent is not to provide absolute, user-level authentication. This method provides signalling to generate a shared secret between two entities which may lead to keying material for private communications.
At the end of this exchange both the entities will possess a shared secret key along with a chosen algorithm with which to utilize this key. This shared secret key may now be used on any subsequent request/response exchanges. It should be noted, that in rare cases the Diffie-Hellman exchange may generate known weak keys for particular algorithms. When this is the case, either entity should disconnect and reconnect to establish a new key set.
The first phase of the figure below, demonstrates the data exchanged during the Diffie-Hellman. The second phase allows for application or protocol specific request messages to be authenticated by the responder. Note that a new random value may be returned with each response.
Note: An optional signature element may also be provided. Tthese are illustrated in italics below.
EMBED Word.Picture.8
Figure A
[
] indicates a sequence of tokens
() indicates a particular token, which may contain multiple elements
{}EDH-Secret indicates the contained values are encrypted utilizing the Diffie-Hellman secret
EPB knows which shared secret key to use to decipher the generalIDb identifier by associating it with the generalIDa, which should also be passed in the message. Note that the encrypted value in phase 2 is passed in the generalID field of a clearToken to simplify encoding.
10.3 Subscription Based Authentication
10.3.1 Introduction
Although the procedures outlined here (and the ISO algorithms from which they are derived) are bi-directional in nature, they may be utilized in only one direction if authentication is only needed in that direction. These exchanges assume that each end possesses some well known identifier (such as a text identifier) which uniquely identifies it. A further assumption is made that there is a mutually acceptable reference to time (from which to derive timestamps). The amount of time skew that is acceptable is a local implementation matter.
There are three different variations that may be implemented depending on requirements:
password based with symmetric encryption
password based with hashing
Certificate based with signatures
In all cases the token will contain the information as described in the following sections depending on the variation chosen. Note that in all cases, the generalID may be known through configuration or directory lookup rather than in band protocol exchange.
10.3.2 Password with symmetric encryption
Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-2, (5.2.1), it is assumed that an identifier and associated password are exchanged during subscription. The encryption key is length N octets (as indicated by the AlgorithmID), and is formed as follows:
- If password length = N, Key = password
- if password length < N, the key is padded with zeros
- if password length > N, the first N octets are assigned to the key, then the N+Mth octet of the password is XORd to the Mmod(N)th octet (for all octets beyond N). (i.e. all extra password octets are repeatedly folded back on the key by XORing)
EMBED Word.Picture.8
Note1: that the return token from EPB is optional; if omitted, only one-way authentication is achieved.
Note2: Ek-pw indicates values that are encrypted using the key k derived from the password pw.
10.3.3 Password with hashing
Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-4, (5.2.1), it is assumed that an identifier and associated password are exchanged during subscription.
EMBED Word.Picture.8
Note1: that the return token from EPB is optional; if omitted, only one-way authentication is achieved
Note2: Hash indicates a hashing function that operates on the contained values
10.3.4 Certificate based with signatures
Shown below is the token format and the message exchange required to perform this type of authentication. This protocol is based on ISO 9798-3, (5.2.1), it is assumed that an identifier and associated certificate are assigned/exchanged during subscription.
Note: An optional certificate element may also be provided these are illustrated in italics below.
EMBED Word.Picture.8
Note1: The return token from EPB is optional; if omitted, only one-way authentication is achieved.
Note2: A payment type certificate may be optionally included by the EPA originator.
Note3: Sign indicates a signing function (from associated certificate) performed on the contained values.
11. Media Stream Encryption Procedures
Media streams shall be encoded using the algorithm and key as presented in the H.245 channel. The following figures show the general flow. Note that the transport header is attached to the transport SDU after the SDU has been encrypted. The opaque segments indicate privacy. As new keys are received by the transmitter and used in the encryption, the SDU header shall indicate in some manner to the receiver that the new key is now in use. For example, in H.323 the RTP header (SDU) will change its payload type to indicate the switch to the new key.
EMBED PowerPoint.Slide.8
Encryption of Media
EMBED PowerPoint.Slide.8
Decryption of Media
11.1 Media Session Keys
Included in the encryptionUpdate is the h235Key. The h235Key is ASN.1 encoded within the context of the H.235 ASN.1 tree and passed as an opaque octet string with respect to H.245. The key may be protected by utilizing one of the three possible mechanisms as they are passed between two endpoints.
If the H.245 channel is secure, no additional protection is applied to the key material. The key is passed in the clear with respect to this field; the ASN.1 choice of secureChannel is utilized.
If a secret key and algorithm has been established outside the H.245 channel as a whole (i.e. outside H.323 or on a h235Control logical channel), the shared secret is used to encrypt the key material, the resultant enciphered key is included here. In this case the ASN.1 choice of sharedSecret is used.
Certificates may be used when the H.245 channel is not secure, but may also be used in addition to the secure H.245 channel. When certificates are utilized the key material is enciphered using the certificates public key and the ASN.1 construct certProtectedKey.
At any point in a conference, a receiver (or transmitter) may request a new key (encryptionUpdateRequest). One reason it might do this is if it suspects that it has lost synchronization of one of the logical channels. The Master receiving this request shall generate new key(s) in response to this command. The Master may also decide asynchronously to distribute new key(s), if so it shall use the encryptionUpdate message.
After receiving an encryptionUpdateRequest, a Master shall send out encryptionUpdate. If the conference is a multipoint one, the MC (also the master) should distribute the new key to all receivers before it gives this key to the transmitter. The transmitter of the data on the logical channel shall utilize the new key at the earliest possible time after receiving the message.
A transmitter (assuming it is not the master) may also request a new key. If the transmitter is part of a multipoint conference the procedure shall be as follows:
the transmitter shall send the encryptionUpateRequest to the MC (master)
the MC should generate a new key(s) and send an encryptionUpdate message to all conference participants except the transmitter.
After distributing the new keys to all other participants the MC shall send the encryptionUpdate to the transmitter. The transmitter shall then utilize the new key.
12. Security Error Recovery
This document does not specify or recommend any methods by which endpoints may monitor their absolute privacy. It does however recommend actions to be taken when privacy loss is detected.
If either endpoint detects a breach in the security of the call connection channel (e.g. H.225.0 for H.323), it should immediately close the connection following the protocol procedures appropriate to the particular endpoint [for H.323 section 8.5 with the exception of step 5].
If either endpoint detects a breach in the security of the H.245 channel or the secured data (h235Control) logical channel, it should immediately close the connection following the protocol procedures appropriate to the particular endpoint [for H.323 section 8.5 with the exception of step 5].
If any endpoint detects a loss of privacy on one of the logical channels it should immediately request a new key (encryptionUpdateRequest) and/or close the logical channel. At the discretion of the MC(U), a loss of privacy on one logical channel may cause all other logical channels to be closed and/or re-keyed at the discretion of the MC(U). MC(U) shall forward encryptionUpdateRequest, encryptionUpdate to any and all endpoints affected.
At the discretion of the MC(U), a security error on an individual channel may cause the connections to be closed on all of the conference endpoints - thus ending the conference.
ANNEX a: H.235 ASN.1
H235-SECURITY-MESSAGES DEFINITIONS AUTOMATIC TAGS ::=
BEGIN
-- EXPORTS All
ChallengeString ::= OCTET STRING (SIZE(8..128))
TimeStamp ::= INTEGER(1..4294967295) -- seconds since 00:00 1/1/1970 UTC
RandomVal ::= INTEGER
Password ::= BMPString (SIZE (1..128))
Identifier ::= BMPString (SIZE (1..128))
KeyMaterial ::= BIT STRING(SIZE(1..2048))
NonStandardParameter ::= SEQUENCE
{
nonStandardIdentifier OBJECT IDENTIFIER,
data OCTET STRING
}
-- if local octet representations of these bit strings are used they shall
-- utilize standard Network Octet ordering (e.g. Big Endian)
DHset ::= SEQUENCE
{
halfkey BIT STRING (SIZE(0..2048)), -- = g^x mod n
modSize BIT STRING (SIZE(0..2048)), -- n
generator BIT STRING (SIZE(0..2048)), -- g
...
}
TypedCertificate ::= SEQUENCE
{
type OBJECT IDENTIFIER,
certificate OCTET STRING,
...
}
AuthenticationMechanism ::=CHOICE
{
dhExch NULL, -- Diffe-Hellman
pwdSymEnc NULL, -- password with symmetric encryption
pwdHash NULL, -- password with hashing
certSign NULL, -- Certificate with signature
ipsec NULL, -- IPSEC based connection
tls NULL,
nonStandard NonStandardParameter, -- something else.
...
}
ClearToken ::= SEQUENCE -- a `token' may contain multiple value types.
{
timeStamp TimeStamp OPTIONAL,
password Password OPTIONAL,
dhkey DHset OPTIONAL,
challenge ChallengeString OPTIONAL,
random RandomVal OPTIONAL,
certificate TypedCertificate OPTIONAL,
generalID Identifier OPTIONAL,
nonStandard NonStandardParameter OPTIONAL,
...
}
ALGORITHM-IDENTIFIER ::= TYPE-IDENTIFIER
--
-- Start all the cryptographic parameterized types here....
--
SIGNED { ToBeSigned } ::= SEQUENCE {
toBeSigned ToBeSigned,
algorithmOID OBJECT IDENTIFIER,
paramS Params, -- any 'runtime' parameters
signature BIT STRING
} ( CONSTRAINED BY { -- Verify or Sign Certificate -- } )
ENCRYPTED { ToBeEncrypted } ::= SEQUENCE {
algorithmOID OBJECT IDENTIFIER,
paramS Params, -- any 'runtime' parameters
encryptedData OCTET STRING
} ( CONSTRAINED BY { -- Encrypt or Decrypt -- ToBeEncrypted } )
HASHED { ToBeHashed } ::= SEQUENCE {
algorithmOID OBJECT IDENTIFIER,
paramS Params, -- any 'runtime' parameters
hash BIT STRING
} ( CONSTRAINED BY { -- Hash -- ToBeHashed } )
IV8 ::= OCTET STRING (SIZE(8))
-- signing algorithm used must select one of these types of parameters
-- needed by receiving end of signature.
Params ::= SEQUENCE {
null NULL, -- no value needed
ranInt INTEGER OPTIONAL, -- some integer value
iv8 IV8 OPTIONAL, -- 8 octet initialization vector
...
}
EncodedGeneralToken ::= TYPE-IDENTIFIER.&Type (ClearToken -- general usage token
PwdCertToken ::= ClearToken (WITH COMPONENTS {..., timeStamp, generalID })
EncodedPwdCertToken ::= TYPE-IDENTIFIER.&Type (PwdCertToken)
CryptoToken::= CHOICE
{
cryptoEncryptedToken SEQUENCE General purpose/application specific token
{
tokenOID OBJECT IDENTIFIER,
token ENCRYPTED { EncodedGeneralToken }
},
cryptoSignedToken SEQUENCE -- General purpose/application specific token
{
tokenOID OBJECT IDENTIFIER,
token SIGNED { EncodedGeneralToken }
},
cryptoHashedToken SEQUENCE -- General purpose/application specific token
{
tokenOID OBJECT IDENTIFIER,
hashedVals ClearToken,
token HASHED { EncodedGeneralToken }
},
cryptoPwdEncr ENCRYPTED { EncodedPwdCertToken },
...
}
-- These allow the passing of session keys within the H.245 OLC structure.
-- They are encoded as standalone ASN.1 and based as an OCTET STRING within H.245
H235Key ::=CHOICE -- this is used with the H.245 h235Key field
{
secureChannel KeyMaterial,
sharedSecret ENCRYPTED {EncodedKeySyncMaterial},
certProtectedKey SIGNED { EncodedKeySignedMaterial },
...
}
KeySignedMaterial ::= SEQUENCE {
generalId Identifier, -- slave's alias
mrandom RandomVal, -- master's random value
srandom RandomVal OPTIONAL, -- slave's random value
timeStamp TimeStamp OPTIONAL, -- masters timestamp for unsolicted EU
encrptval ENCRYPTED {EncodedKeySyncMaterial }
}
EncodedKeySignedMaterial ::= TYPE-IDENTIFIER.&Type (KeySignedMaterial)
KeySyncMaterial ::=SEQUENCE
{
generalID Identifier,
keyMaterial KeyMaterial,
}
EncodedKeySyncMaterial ::=TYPE-INDENTIFIER.&Type (KeySyncMaterial)
H235CertificateSignature ::=SEQUENCE
{
certificate TypedCertificate,
responseRandom RandomVal,
requesterRandom RandomVal OPTIONAL,
signature SIGNED { EncodedReturnSig },
}
ReturnSig ::= SEQUENCE {
generalId Identifier, -- slave's alias
responseRandom RandomVal,
requestRandom RandomVal OPTIONAL,
certificate TypedCertificate OPTIONAL - requested certificate
}
EncodedReturnSig ::= TYPE-IDENTIFIER.&Type (ReturnSig)
END -- End of H235-SECURITY-MESSAGES DEFINITIONS
ANNEX B: H.323 Specific Topics
1. Background
Shown below is a diagram giving an overview of the H.235 scope within the H.323 recommendation.
EMBED Word.Picture.8
For H.323 the signalling of usage of TLS, IPSEC or a proprietary mechanism on the H.245 control channel shall occur on the secured or unsecured H.225.0 channel during the initial Q.931 message exchange.
2. Signalling and Procedures
The procedures outlined in H.323, Section 8 - Call Signalling Procedures, shall be followed. The H.323 endpoints shall have the ability to encode and recognize the presence (or absence) of security requirements (for the H.245 channel) signaled in the H.225.0 messages.
In the case where the H.225.0 channel itself is to be secured, the same procedures in H.323, Section 8 shall be followed. The difference in operation is that the communications shall only occur after connecting to the secure TSAP identifier and using the predetermined security modes (e.g. TLS). Due to the fact that the H.225.0 messages are the first exchanged when establishing H.323 communications, there can be no security negotiations in band for H.225.0. In other words, both parties must know a priori that they are using a particular security mode. For H.323 on IP, an alternative Well Known Port (1300) is utilized for TLS secured communications.
One purpose of H.225.0 exchanges as they relate to H.323 security, is to provide a mechanism to set up the secure H.245 channel. Optionally, authentication may occur during the exchange of H.225.0 messages. This authentication may be certificate or password based, utilizing encryption and/or hashing (i.e. signing). The specifics of these modes of operation are described in sections ( REF _Ref394290868 \n 0- REF _Ref394290904 \n 0).
An H.323 endpoint that receives a Setup message with the h245SecurityCapability set shall respond with the corresponding, acceptable h245SecurityMode in the Connect message. In the cases in which there are no overlapping capabilities, the called terminal may refuse the connection by sending a Release Complete with the reason code set to SecurityDenied. This error is intended to convey no information about any security mis-match and the calling terminal will have to determine the problem by some other means. In cases where the calling terminal receives a Connect message without sufficient or an acceptable security mode, it may terminate the call with a Release Complete with SecurityDenied. In cases where the calling terminal receives a Connect message without any security capabilities, it may terminate the call with a Release Complete with undefinedReason.
If the calling terminal receives an acceptable h245Security mode, it shall open and operate the H.245 channel in the indicated secure mode. Failure to set up the H.245 in the secure mode determined here should be considered a protocol error and the connection terminated.
2.1 Revision 1 Compatibility
A security capable endpoint shall not return any security related fields, indications or status to the non-security capable endpoint. If a callee receives a Setup message that does not contain the H245Security capabilities and/or authentication token, it may return a ReleaseComplete to refuse the connection; but it shall use the reason code of UndefinedReason in this case. In a corresponding manner, if a caller receives a Connect message without an H245SecurityMode and/or authentication token having sent a Setup message with H245Security and/or authentication token it may also terminate the connection by issuing a ReleaseComplete with a reason code of UndefinedReason.
3. RTP/RTCP Issues
The use of encryption on the RTP streamitem A (initialization vector, sentence will follow the general methodology recommended in the document referenced in [RTP]. The encryption of the media shall occur in an independent, packet by packet basis. The RTP header (including the payload header) shall not be encrypted. Synchronization of new keys and encrypted text is based upon dynamic payload type.
Initial encryption key is presented by the master in conjunction with the dynamic payload number (via EncryptionSync in H.245). The receiver(s) of the media stream shall start initial use of the key upon receipt of this payload number in the RTP header. New key(s) may be distributed at any time by the master endpoint. The synchronization of the newer key with the media stream shall be indicated by the changing of the payload type to a new dynamic value. Note that the specific values dont matter, as long as they change for every new key that is distributed.
It is assumed that encryption is applied just to the payload in each RTP packet; the RTP headers remaining in the clear. It is assumed that all RTP packets must be a multiple of whole octets. How the RTP packets are encapsulated at the transport or network layer is not relevant to this Recommendation. All modes must allow for lost (or out-of-sequence) packets, in addition to padding packets to an appropriate multiple of octets.
Deciphering the stream must be stateless due to the fact that packets may be lost; each packet decipherable on its own merits. Two requirements of Block algorithm mode shall operate as follows:
A. Initialization vectors
Most block modes involve some chaining; each encryption cycle depends in some way on the output of the previous cycle. Therefore, at the beginning of a packet, some initial block value (usually called an Initialization Vector - IV) must be provided in order to start the encryption process. Independent of how many stream octets are processed on each encryption cycle, the length of the IV is always equal to the length of a block. All modes except Electronic Code Book (ECB) mode require an IV. In all cases, an IV shall be constructed from the first B (where B is the block size) octets of: (Seq# + Timestamp). This pattern should be repeated until enough octets have been generated. It should be noted that the IV generated in this manner may produce a key pattern that is considered weak for a particular algorithm.
B. Padding
ECB and CBC modes always process the input stream a block at a time, and, while CFB and OFB can process the input in any number of octets, N (<=B), it is recommended that N=B.
Two methods are available to handle packets whose payload is not a multiple of blocks.
1. Ciphertext Stealing for ECB and CBC; Zero pad for CFB and OFB
2. Padding in the manner prescribed by [RTP] (section 5.1)
[RTP] section 5.1 describes a method of padding in which the payload is padded to a multiple of blocks, the last octet set with the number of padding octets (including the last), and the P bit set in the RTP header. The value of the pad should be determined by the normal convention of the cipher algorithm..
All H.235 implementations shall support both schemes. The scheme in use can be deduced as follows: If the P bit is set in the RTP header, then the packet is padded; if the packet is not a multiple of B and the P bit is not set, then Ciphertext Stealing applies, else the packet is a multiple of B, and padding does not apply.
Integrity and replay protection of the RTP stream is for further study.
Application of cryptographic techniques to RTCP elements is for further study.
4. RAS Signalling/Procedures for Authentication
4.1 Introduction
This annex will not explicitly provide any form of message privacy between gatekeepers and endpoints. There are two types of authentication that may be utilized. The first type is symmetric encryption based that requires no prior contact between the endpoint and Gatekeeper. The second type is subscription based and will have two forms, password or certificate. All of these forms are derived from the procedures shown in sections REF _Ref394290868 \n 0, REF _Ref399040981 \n 0, REF _Ref399041035 \n 0 and REF _Ref394290904 \n 0. In this annex, the generic labels (EPA and EPB) shown in the aforementioned sections will represent the Endpoint and Gatekeeper respectively.
4.2 Endpoint-Gatekeeper Authentication (Non-Subscription Based)
This mechanism may provide the Gatekeeper with a cryptographic link that a particular endpoint which previously registered, is the same one that issues subsequent RAS messages. It should be noted that this may not provide any authentication of the Gatekeeper to the endpoint, unless the optional signature element is included. The establishment of the identity relationship occurs when the terminal issues the GRQ as outlined in H.323 section 7.2.1. The Diffie-Hellman exchange shall occur in conjunction with the GRQ and GCF messages as shown in the first phase of section REF _Ref394290868 \n 0. This shared secret key shall now be used on any subsequent RRQ/URQ from the terminal to the gatekeeper. If a Gatekeeper operates in this mode and receives a GRQ without a token containing the DHset or an acceptable algorithm value, it shall return a securityDenial reason code in the DRJ.
The Diffie-Hellman shared secret key as created during the GRQ/GCF exchange may be used for authentication on subsequent xRQ messages. The following procedures shall be used to complete this mode of authentication.
Terminal (xRQ):
The terminal shall provide all of the information in the message as described in the appropriate H.225.0 sections.
The terminal shall encrypt the GatekeeperIdentifier (as returned in the GCF) using the shared secret key that was negotiated. This shall be passed in a cryptoToken as the generalID.
The 16 bits of the random and then the requestSeqNum shall be XORd with each 16 bits of the GatekeeperIdentifier. If the GatekeeperIdentifier does not end on an even 16 boundary, the last 8 bits of the GatekeeperIdentifier shall be XORd with the least significant octet of the random value and then requestSeqNum. The GatekeeperIdentifier shall be encrypted using the selected algorithm in the GCF (integrity) and utilizing the entire shared secret.
In order to cryptographically link this and subsequent messages with the original registrant (the endpoint that issued the RRQ) the most recent random value returned shall be utilized (this value may be one newer than the value returned in the RCF - from a later xCF message).
Gatekeeper (xCF/xRJ)
Gatekeeper shall encrypt its GatekeeperIdentifier (following the above procedure) with the shared secret key associated with the endpoint alias and compare this to the value in the xRQ
Gatekeeper shall return xRJ if the two encrypted values do not match.
If GatekeeperIdentifier matches Gatekeeper shall apply any local logic and respond with xCF or xRJ.
If an xCF is sent by the Gatekeeper, it should contain an assigned EndpointIdentifier and a new random value in the random field of a clearToken.
Refer to the second phase of the figure contained in section REF _Ref394290868 \n 0 for a graphical representation of this exchange. The gatekeeper knows which shared secret key to use to decipher the Gatekeeper identifier by the Alias name in the message.
4.3 Endpoint-Gatekeeper Authentication(Subscription Based)
All RAS messages other than GRQ/GCF should contain the authentication tokens required by the specific mode of operation. There are three different variations that may be implemented depending on requirements and environment:
password based with symmetric encryption
password based with hashing
Certificate based with signatures
In all cases the token will contain the information as described in the following sections depending on the variation chosen. If a Gatekeeper operates in a secure mode and receives a RAS message without an acceptable token value, it shall return a securityDenial reason code in the reject message. In all cases the return token from GK is optional; if omitted, only one-way authentication is achieved]
4.3.1 Password with symmetric encryption
EMBED Word.Picture.8
4.3.2 Password with hashing
It is assumed that an Alias and associated password are exchanged out of band to this particular message exchange.
EMBED Word.Picture.8
4.3.3 Certificate based with signatures
EMBED Word.Picture.8
5. Non-terminal Interactions
5.1 Gateway
As stated in section REF _Ref379882131 \n 0, an H.323 Gateway should be considered a trusted element. This includes protocol gateways (H.323-H.320 etc.
) and security gateways (proxy/firewalls). The media privacy can be assured between the communicating endpoint and the gateway device; but what occurs on the far side of the gateway should be considered insecure by default.
ANNEX C: H.324 Specific Topics
FFS
Appendix I: H.323 Implementation Details
1. Ciphertext padding methods
There is a description of Ciphertext Stealing in [Schneier], p191, p196. The diagrams that follow illustrate the technique.
2. New Keys
The procedures outlined in H.323 section 8.5 are completed by an MC to eject a participant from a conference. The Master may generate new encryption keys for the logical channels (and not distribute them to the ejected party); this may be used to keep the ejected party from monitoring the media streams.
3. H.323 Trusted Elements
In general MC(U)s, Gateways and Gatekeepers (if implementing the gatekeeper-routed model) are trusted with respect to the privacy of the control channel. If the connections establishment channel (H.225.0) is secured and routed through the Gatekeeper, it must also be trusted. If any of these H.323 components must operate on the media streams (i.e. mixing, transcoding) then by definition, they shall also be trusted for the media privacy.
Firewall Proxies (though not H.323-specific elements) may also be trusted, since they terminate connections, and may well have to manipulate the messages and media streams.
4. Implementation Examples
These next sections describe example implementations that might be developed within the H.235 framework. These are not intended to constrain the many other possibilities available within this recommendation; rather to give more concrete examples of usage within H.323.
4.1 Tokens
This section will describe an example usage of security tokens to obscure or hide destination addressing information. The example scenario is an endpoint which wishes to make a call to another endpoint utilizing its well known alias. More specifically this involves an H.323 endpoint, Gatekeeper, POTS-Gateway, and telephone as illustrated below.
EMBED Word.Picture.8
Currently, H.323 may operate in a manner similar to a telephone network with caller-ID. This scenario will illustrate a situation in which the callee does not want to expose its physical address, while still allowing the call to complete. This may be important in POTS-H.323 gateways, where the target phone number may need to stay private.
Assume that EPA is trying to call POTSB, and POTSB does not want to expose its E.164 phone number to EPA. (How this policy is established is beyond the scope of this example).
EPA will send an ARQ to its Gatekeeper to resolve the address of the POTS telephone as represented by its alias/GW. The Gatekeeper would recognize this as a private alias, knowing that in order to complete the connection it must return the POTS-gateway address. (Similar to returning the address of an H.320 Gateway if an H.320 endpoint is called by an H.323 endpoint).
In the returned ACF, the Gatekeeper returns the POTS-Gateways address as expected. The addressing information that is required to dial to the end telephone (i.e. the telephone number) is returned in an encrypted token included in the ACF. This encrypted token contains the actual E.164 (phone number) of the telephone which cannot be deciphered nor understood by the caller. (i.e. EPA)
The endpoint issues the SETUP message to the Gateway device (whose call signalling address was returned in the ACF) including the opaque token(s) that it received with the ACF.
The Gateway upon receiving the SETUP, issues its ARQ to its Gatekeeper including any token(s) that were received in the SETUP.
The Gatekeeper is able to decipher the token(s) and return the phone number in the ACF.
Partial ASN.1 of an example token structure is shown below, with the field contents described. Assume we utilize the cryptoEncodedGeneralToken to contain the encrypted telephone number.
An implementation might choose a tokenOID denoting this token as containing the E.164 phone number. The particular method that is used to encrypt this phone number (for example 56bit DES) would be included in the ENCRYPT definition algorithmOID.
CryptoToken::= CHOICE
{
cryptoEncodedGeneralToken SEQUENCE -- General purpose/application specific token
{
tokenOID OBJECT IDENTIFIER,
ENCRYPTED { EncodedGeneralToken }
},
.
.
. [abbreviated text]
.
}
The CryptoToken would be passed in the SETUP (from EPA to GW) and the ARQ (from the GW to the Gatekeeper) messages as outlined above. After the Gatekeeper decrypted the token (the telephone number) it would pass the clear version of this in the clearToken
4.2 Password
In this example, it is assumed that the user is a subscriber to the Gatekeeper (i.e. the user will be in its zone) and has an associated subscription ID and password. The user would register with the Gatekeeper using the subscription ID (as passed in an alias - H323ID) and encrypting a challenge string presented by the Gatekeeper. This assumes that the Gatekeeper also knows the password associated with the subscription ID. The Gatekeeper will authenticate the user by verifying that the challenge string was correctly encrypted.
The example registration procedure with Gatekeeper authentication is as follows:
If the endpoint uses GRQ to discover a Gatekeeper, one of the aliases in the message would be the subscription ID (as an H323ID). The authenticationcapability would contain an AuthenticationMechanism of pwdSymEnc and the algorithmOIDs would be set to indicate the entire set of encryption algorithms supported by the endpoint. (For example one of these would be 56 bit DES in EBC mode.)
The Gatekeeper would respond with GCF (assuming it recognizes the alias) carrying a tokens element containing one ClearToken. This ClearToken would contain both a challenge and a timeStamp element. The challenge would contain 16 octets (To prevent replay attacks, the ClearToken should contain a timeStamp.) The authenticationmode should be set to pwdSymEnc and the algorithmOID should be set to indicate the encryption algorithm required by the Gatekeeper (for example, 56 bit DES in EBC mode)
If the Gatekeeper does not support any of the algorithmOIDs indicated in the GRQ, then it would respond with a GRJ containing a GatekeeperRejectReason of resourceUnavailable.
The endpoint application should then attempt to register with (one of) the GK(s) that responded with a GCF by sending an RRQ containing a cryptoEPPwdEncr in the cryptoTokens. The cryptoEPPwdEncr would have the algorithmOID of the encryption algorithm agreed to in the GRQ/GCF exchange, and the encrypted challenge.
The encryption key is constructed from the users password using the procedure described in section 13.3.3.34 of H.235. The resulting octet string is then used as the DES key to encrypt the challenge.
When the Gatekeeper receives the encrypted challenge in the RRQ, it would compare it to an identically generated encrypted challenge to authenticate the registering user. If the two encrypted strings do not match, the Gatekeeper should respond with an RRJ with the RegistrationRejectReason set to securityDenial. If they match, the Gatekeeper sends an RCF to the endpoint.
If the Gatekeeper receives an RRQ which does not contain an acceptable cryptoTokens element then it should respond with an RRJ with a GatekeeperRejectReason of discoveryRequired. The endpoint, upon receiving such an RRJ may perform discovery which will allow the Gatekeeper/endpoint to exchange a new challenge. Note that the GRQ message may be unicast to the Gatekeeper.
4.3 IPSEC
In general, IPSec [13/IPSEC] can be used to provide Authentication and, optionally Confidentiality (i.e., encryption) at the IP layer transparent to whatever (application) protocol runs above. The application protocol does not have to be updated to allow this; only security policy at each end.
For example, to make maximum use of IPSec for a simple point-to-point call, the following scenario could be followed:
The calling endpoint and its gatekeeper would set policy to require the use of IPSec (Authentication and, optionally Confidentiality) on the RAS protocol. Thus, before the first RAS message is sent from the end point to the gatekeeper, the ISAKMP/Oakley daemon on the endpoint will negotiate security services to be used on packets to and from the RAS channel's well-known port. Once negotiation is complete the secured RAS channel will operate exactly as if it were not secured. Using this secure channel the gatekeeper will inform the end point of the address and port number of the call signalling channel in the called endpoint.
After obtaining the address and port number of the call signalling channel, the calling endpoint would dynamically update its security policy to require the desired IPSec security on that address and protocol/port pair. Now, when the calling endpoint attempts to contact this address/port the packets would be queued while an ISAKMP/Oakley negotiation is performed between the end points. Upon completion of this negotiation, an IPSec Security Association (SA) for the address/port will exist and the Q.931 signalling can proceed.
On the Q.931 Setup and Connect exchange, the endpoints can negotiate the use of IPSec for the H.245 channel. This will allow the endpoints to again dynamically update their IPSec policy databases to force the use of IPSec on that connection.
As with the call signalling channel, a transparent ISAKMP/Oakley negotiation will take place before any H.245 packets are transmitted. The authentication performed by this ISAKMP/Oakley exchange will be the initial attempt at user-to-user authentication, and will set up a (probably) secure channel between the two users on which to negotiate the characteristics of the audio channel. If, after some person-to-person Q&A, either user is not satisfied with the authentication, different certificates can be chosen and the ISAKMP/Oakley exchange repeated.
After each H.245 ISAKMP/Oakley authentication, new keying material is exchanged for the RTP Audio channel. This keying material is distributed by the Master on the secure H.245 channel. Because the H.245 protocol is defined for the master to distribute the media keying material on the H.245 channel (to allow for multipoint communication), it is not recommended that IPSec be used for the RTP channel.
An encrypted H.245 channel is a potential problem for Proxy or NAT Firewall, since the dynamically-assigned port numbers are carried in the H.245 protocol. Such Firewalls would have to decipher, modify and re-encipher the protocol to operate correctly. For this reason, the Security Logical Channel was introduced into H.245. If this channel is used, the H.245 channel can remain unsecured; authentication and key-generation would be done with the Security Logical Channel. Logical Channel signalling would allow this channel to be protected with IPSec, and the secret key used on the Security Logical Channel would be used to protect the EncryptionSync distributed by the master on the H.245 channel.
Appendix II: H.324 Implementation Details
FFS
Appendix III: Other H series Implementation Details
FFS
APPENDIX IV: BIBLIOGRAPHY
[Daemon]
J. Daemon, Cipher and Hash function design, Ph.D. Thesis, Katholieke Universiteit Leuven, Mar 95.
[IPSEC]
Internet Engineering Task Force, 1997 The OAKLEY Key Determination Protocol draft-ietf-ipsec-oakley-02.txt, H. K. Orman
Internet Engineering Task Force, 1997 Internet Security Association and Key Management Protocol (ISAKMP) draft-ietf-ipsec-isakmp-08.text, D. Maughan, M. Schertler, M. Schneider and J. Turner
Internet Engineering Task Force, 1997 IP Authentication Header draft-ietf-ipsec-auth-header-01.txt, S. Kent, and R. Atkinson
Internet Engineering Task Force, 1997 The resolution of ISAKMP with Oakley draft-ietf-ipsec-isakmp-oakley-04.txt, D. Harkins, D. Carrel
[RTP]
Internet Engineering Task Force, 1996 RTP: A Transport Protocol for Real-Time Applications, RFC 1889, H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson
[Schneier]
Applied Cryptography, Second Edition Protocols, Algorithms, and Source Code in C, Bruce Schneier: John Wiley & Sones, Inc., 1996
[TLS]
Internet Engineering Task Force, 1997 The TLS Protocol Version 1.0 draft-ietf-tls-protocol-03.txt, T. Dieks, C. Allen
It should be noted that if RTP packet size is larger than MTU size, partial loss (of fragment) will cause the whole RTP packet to be indecipherable.
White Paper - H.235 Version 1, 9/97
White Paper - H.235 Version 1, 9/97
PAGE 30
H.235 SAVEDATE \* MERGEFORMAT 25.01.98 22:01
PAGE v
SAVEDATE \* MERGEFORMAT 25.01.98 22:01 H.235
H.235 SAVEDATE \* MERGEFORMAT 25.01.98 22:01 PAGE29
PAGE \# "'Page: '#''" IPSEC provides network security. Since IPSEC is one of the proposed ways of achieving authentication/confidentiality in this Recommendation, we should probably also add that The Recommendation also has provisions for incorporating any available security provided by the network (such as IPSEC).
PAGE \# "'Page: '#''" It might be useful to utilize an authoritative source to define the general terminology. The capitalization of terms changes from term to term.
PAGE \# "'Page: '#''" In other words, the certificate means a certified public key. Would it be useful to refer to public keys instead of certificate, then?
PAGE \# "'Page: '#''" confidentiality is usually used as synonym of privacy
PAGE \# "'Page: '#''" The definition here does not include the hash functions (MD5, SHA).
PAGE \# "'Page: '#''" Use information unreadable or data unintelligible
PAGE \# "'Page: '#''" Integrity also includes detecting any unauthorized alteration
PAGE \# "'Page: '#''" This is usually used as a synonym of confidentiality.
PAGE \# "'Page: '#''" It might be useful to spell out that a private channel uses encryption and optional authentication procedures agreed on the secure channel.
PAGE \# "'Page: '#''"
using proper public-key authentication method
PAGE \# "'Page: '#''" Again, see previous comment concerning term certificatePPe3.
PAGE \# "'Page: '#''" This implies that exchange of certificates is not based on a shared secret. In Section 10.1, certificates are included under subscription based which is defined as having a prior shared secret. They are inconsistent statements. It seems to me that the former is right, while the latter is not. See comment in section 10.1.
PAGE \# "'Page: '#''" In order to authenticate claimant (the presenter of a certified public key), the claimant must sign something provided by the verifier or the generalID of the verifier. The definition of verifier should be added to the list of definitions.
PAGE \# "'Page: '#''" This should probably be digital signatures.
PAGE \# "'Page: '#''" This sounds strange. I would say that we would be protected against man-in-the-middle attack only if we know who the correspondent is.
PAGE \# "'Page: '#''" Add subsection 6.2.2 for shared secret schemes, and subsection 6.2.3 for Other security protocols. In 6.2.2, we need to state that the Recommendation does not specify how the shared secret is established and managed.
PAGE \# "'Page: '#''" Isnt distribution done by the claimant by sending the certificate along with the digital signature to the verifier?
PAGE \# "'Page: '#''"
does not provide any security at all.
PAGE \# "'Page: '#''" security (???)
PAGE \# "'Page: '#''"
encryption parameters, including keys,
PAGE \# "'Page: '#''" Does this include the RTP headers, too?
PAGE \# "'Page: '#''" The first method is asymmetric Diffie-Hellman key exchange. It includes an optional public key based authentication, and it requires no prior direct contact between entities.
PAGE \# "'Page: '#''" There is an important difference between password and certificate based schemes as described here. In the password based scheme, EPB needs to know the password that EPA uses by means other than from EPA. However, in certificate based schemes, EPB could find the public-key of EPA directly from EPA by receiving the public key certificate from EPA. Hence, password based schemes (as described here) requires prior contact between EPA and EPB, but certificate based schemes do not. This difference should be highlighted
Moreover, there seems to be an inconsistency in the description of subscription based in this section and in section 6.2. See comment there.
PAGE \# "'Page: '#''" Things that I dont understand: what we are trying to establish in addition to the plain Diffie-Hellman handshake? It should be made clear that the procedure here is not authentication but a key-exchange (unless optional authentication is included). Why we are including the random number randomb and the timea etc (certainly, it does not protect against a man in the middle). Is this a standard ISO or IETF protocol? The first generalIDa should probably be generalIDb. The modulus and base should be defined for the Diffie-Hellman. How the optional authentication procedure differs from the authentication presented in the subsection 10.3.4?
PAGE \# "'Page: '#''" The meaning of the generalID should be defined somewhere.
PAGE \# "'Page: '#''" It might be more useful reuse password bytes instead of padding.
PAGE \# "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-2). It should be noted that each endpoint generates their own timeStamp.
PAGE \# "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-2). It should be noted that each endpoint generates their own timeStamp. The generalID and timestamp values should be included in the ClearToken, but not the password. ( Annex A suggests that all information in the cryptoHashedToken is included in clear text as hashedVals ClearToken.
We suggest that the CryptoToken is written as
CryptoToken[
timeStampa, generalIDb, (,timeStampa, generalIDb, password)Hash
]
where (foo)Hash means only the hash value of foo. Another possibility is to use notation
CryptoToken[
(,timeStampa, generalIDb)Hashpassword
]
where (foo)Hash implicitly includes the cleartext foo in the CryptoToken.
PAGE \# "'Page: '#''" Instead of using a hash function (such as MD5 or SHA-1) on (timeStamp, generalID, password), a better approach is to use HMAC which is defined in RFC2104. The former approach, generally referred to as keyed-xxx (where xxx is a hash function), is somewhat inferior to HMAC-xxx. The IETF also favors HMAC-xxx.
PAGE \# "'Page: '#''" The first exchange of the generalIDs is not part of the authentication mechanism (presented in ISO 9798-3). It should be noted that each endpoint generates their own timeStamp.
PAGE \# "'Page: '#''" It should be noted what kind of transfer encoding is to be used, e.g., within h235Key. The usage of the ASN.1 types should be specified somewhere in a very detailed way. How a type is signed? How it is encrypted? How a hash is generated? How we can generate a keyed hash?
PAGE \# "'Page: '#''" An important difference between TLS and IPSEC should probably be pointed out. TLS is usually application coupled (i.e., built into the application), while IPSEC is usually network coupled (i.e., built into the operating system). This could possibly be pointed out by incorporating a subsection for TLS in the Implementation Examples section, as has been done for IPSEC.
PAGE \# "'Page: '#''" What? A Q.931channel, probably?
PAGE \# "'Page: '#''" Will not follow?
PAGE \# "'Page: '#''" This footnote is indecipherable. The RTP uses underlying IP packet delivery, a UDP packet with missing fragments is never presented to the application (i.e. the RTP protocol).
PAGE \# "'Page: '#''" This does not seem to make sense. The IV is not a key, or a key pattern. Are there really weak initialization vectors? I think that here should be stated that the initial timestamp and sequence number should be generated by a cryptographically strong random number generator.
PAGE \# "'Page: '#''" Delete braces
)+Vn¡¢¶ÖÜÝ6>mó;ÐÞãêûüö÷ø
}©®³Ž¹ºÌÚÛüòëæÞØÒæÒæÞæÌæÅæÌææÃÃÃæÅæÒæÀ²®©À¥©CJOJQJ56CJ(OJQJ5CJ05@(CJ<OJQJ5@(CJH5CJOJQJ5CJjê<HhÐ!&HUCJ60JKOJQJ5OJQJ>*OJQJ:OJQJ5:OJQJOJQJEHOJQJjHhÐ!&HU/)*+,-Vn¡¢òòòòãµØ $$l4Ö
ÿìè<&@dŽ€x$E&/µ.µ&@€ª€x$E&/µ.µ-$$l4ÖHÿìèÀ<&@€ª$E&/µ.µ&@$E&/µ.µ
)*+,-Vn¡¢£€¥Žµ¶ÔÕÖ)*56>?=>ðñòóôõö"L|}~ª«¬®ºüýþÿ 0 2 3 4 Ž · ž ¹ º » Œ Å Æ ÿ
×ØÂêìîðòô
`iÂýýýýýûýýýýýýûùùùùùùùùù÷ýýýûõõóóñïíëèæÓÔ ÏÎÍ̪ Õ
[¢£€¥Žµ¶ÔÕÖ)*56>?=>ðñòòòêêêêáááßßßÜßßßßßÙßßÌÌŠZù
Æ£+$$ Õ$ª
ÆYÕª
ÆYÕ&d/µ.µ
ÆYòóôõö"L|}~ª«¬®ºüòéééßßÕÏÍÊÊÅ·ÍÍͯ€
Ðdÿ
Æ&Ð
Æ&
$$l4Öÿüá$€$$
Æ: ®Rù
Æ: ŠZù
Æ+
Æ£+ŠZù
Æ£+üýþÿ 0 2 3 4 Ž · ž ¹ º » Œ Å ÷÷÷÷÷÷óóãßÛÛß×ÓÅ¿œœœ»Ï
ÆŽ
Ð&d(d
Ƨ%ÎÐÍÐÐÌÐЀ9&d(d
Ƨ%ªÐÐ
Ƨ%üý 2 3 4 ¬ · ž ôö`aû &'¯°&)1ÕÖëìõö-.HIJKL\]wùöòêòçäßòÚØÖÖÖÅÖÖ···€······$jTzHhÐ!&HCJU$jÔyHhÐ!&HCJUjHhÐ!&HU!jHhÚ²!H0JË<U65OJQJOJQJCJ CJ5CJ$OJQJ5CJ$CJCJOJQJ2Å Æ ÿ
×ØÂêìîðòô
`iÂ3ÛRÓÔÕM|¹ýûûûûûøûûûûûøûóññññññûïïïïïÃÓÔ
&F$Â3ÛRÓÔÕM|¹èK~±ñ4m¢ÓMÁKµõ/cÞ c « à +!i!³!û!4"q"s"t"}"~"ï#ð#!$"$Š%#'Ÿ'u(I)£)u*v*w*,,ýýýýýûùùùùùùù÷÷õ÷÷÷÷õ÷ù÷ù÷÷÷÷÷ù÷÷ù÷÷÷õõõõù÷ùûòïìéæãÝÕÍÅœµª§€¡nöÿÿý÷ÿÿþ÷ÿÿÿ÷ÿÿÑøÿÿ
+ùÿÿ
ÿùÿÿ
¶úÿÿ
Qûÿÿ
Îüÿÿ
Rþÿÿ Sþÿÿþÿÿ
þÿÿöÿÿÿ÷ÿÿÿÄ×à Ó?wxyz{Žµ¶·žÈÉãäåæçÿ+,FGHIJ^_yz{|}¬®¯íßßßÌßßß¹ßßߊßßßßßßßßßsß jÔ}HhÐ!&HU jT}HhÐ!&HU jÔ|HhÐ!&HU$jT|HhÐ!&HCJU$jÔ{HhÐ!&HCJU$jT{HhÐ!&HCJUjHhÐ!&HU$jÔzHhÐ!&HCJU-¹èK~±ñ4m¢ÓMÁKµõ/cÞ c « à +!i!ýýûûùûûûûùûýûýûûûûûýûûýûûûùùùÄ×ï°ÑÒìíîïð/0123MNhijkl ¡³ŽÎÏÐÑÒæç-.HIòòáòòòÐòòò¿òòò®òòòòòòòòòy$jTHhÐ!&HCJU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔ~HhÐ!&HU jT~HhÐ!&HUjHhÐ!&HU/IJKL_`z{|}~¡¢ŒœŸ¿Àäåÿ*+EFGIJcd~¯°±³ŽÔÕïòòòáòòòÎòòòœòòò¬òòòòòòòòò jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU$jTHhÐ!&HCJU jÔHhÐ!&HUjHhÐ!&HU0ïðñóô)*+-.BC]^_abopœŸØÙÚÜÝðñ
B C ] ^ _ a b ïáááÎáááœááá¬áááááááááwáá jÔHhÐ!&HU jTHhÐ!&HU$jÔHhÐ!&HCJU jTHhÐ!&HU jÔ
HhÐ!&HU$jT
HhÐ!&HCJUjHhÐ!&HU jÔHhÐ!&HU.b ¥ Š § © ª ¿ À Ú Û Ü Þ ß
!!%!&!'!)!*!H!I!c!d!e!g!h!!!!®!¯!±!²!Ú!Û!õ!ö!÷!ù!ú!""."/"0"òáòòòÐòòò¿òòò®òòòòòòòòòyò jTHhÐ!&HU$jÔHhÐ!&HCJU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HU jÔHhÐ!&HU jTHhÐ!&HUjHhÐ!&HU/i!³!û!4"q"s"t"}"~"ï#ð#!$"$Š%ýûùû÷÷õ÷÷÷òò«F
&FEÆ;Ð!&.$×ÃÄ
0"2"3"P"Q"k"l"m"o"p"q"r"ð#"$;5Å5Œ9œ9Ÿ9`:ñ:];^;_;o;ò;<K<Y<€<ª<>>ü>þ>??à?á?â?ã?ä?ë?@ @/@0@òòßòòòÝÚÑËȱ«Š€€«Š€€Ë€€«wj0JË<U5cHgHHhj<!fH5!jHhm<!fH0JË<U5OJQJ5OJQJ-jHhk<!fH0JË<OJQJUmH mH cHgHHhß²!HCJB*$jÔHhÐ!&HCJUjHhÐ!&HU.Š%#'Ÿ'u(žq*F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.u(I)£)u*v*žq*(F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.v*w*,,J-K-U/V/D0E0F0^0_022á2z3Ó3|4Å4;5Å5V6ü6²7G8Â8T9ýúúýýýýýýýøýýýòòòòòòîòòòòòòÐÐ0ý$,J-K-U/V/D0E0F0^0_022á2z3Ó3|4Å4;5Å5V6ü6²7G8Â8T9É9O:Q:`:_;ò;K<€<>â? @@+ADBB(CÛCüùöóðíêçäáÞÛØÕÒÏÌÉÆÃÀœº·Ž±®ç©€|wrmÓ)÷ÿÿÓº÷ÿÿÓ
øÿÿÓ&ùÿÿÓµùÿÿÓ1úÿÿÓoúÿÿÓ@üÿÿÓýÿÿÓþÿÿÓ_þÿÿÓòþÿÿÐñÿÿÿ÷õÿÿ}öÿÿòöÿÿ÷ÿÿÿ÷ÿÿøÿÿJùÿÿðùÿÿúÿÿûÿÿûÿÿÊûÿÿsüÿÿÌüÿÿeýÿÿœýÿÿŸýÿÿçÿÿÿèÿÿÿ/òÿÿ0òÿÿóÿÿóÿÿ)õÿÿ*õÿÿmöÿÿ)T9É9O:Q:`:_;ò;K<€<>â? @@+ADBB(CÛCrD0EäEµF¡GÔGÕGòGóGKHLHùù÷õóñññññññññññññóóóññ÷õ÷÷÷ÓÐÐ0ý0@@³@(A)A+A7A}A~ADBMBBBB¥B(C4CÛCÜCÝCìCqDrDsDtD|D.E/E0E1E2E@EâEãEäEûõûäûõûÓûõûÂûõûõû¶§õûõr[-jHhg£!FH0JË<OJQJUmH -jHhe£!FH0JË<OJQJUmH mH 5mH HhÏÍ!H5mH 5cHgHmH HhÏÍ!H5OJQJ5OJQJcHgH!jHh£!FH0JË<U!jHh{£!FH0JË<U!jHhc£!FH0JË<U5OJQJOJQJ"ÛCrD0EäEµF¡GÔGÕGòGóGKHLHgH|HH¶HÙHI0IJIII¹I»IÊIËIJ+JiJÎJÏJãKäKðMñMòMôMNNN;O¹OûöñìçâßÜÙÖÓÐÍÊÇÄÁŸ»žµ²¯Ü¬©Š£ Ü
woÐþÿÿ
}ÿÿÿ
ôÿÿÿ
éÿÿÿÉûÿÿÊûÿÿËûÿÿ×ýÿÿØýÿÿìþÿÿíþÿÿRÿÿÿÿÿÿ»ÿÿÿðÿÿÿñÿÿÿþÿÿ<þÿÿTþÿÿþÿÿ¥þÿÿºþÿÿüþÿÿÿÿÿ9ÿÿÿYÿÿÿnÿÿÿÿÿÿÿÿÿâÿÿÿãÿÿÿ}òÿÿÓ°òÿÿÓóÿÿÐmôÿÿÐ!õÿÿÐßõÿÿÓvöÿÿ)äEåEæEìEíEîEñEòEóEFDFEFµFéF¡G§GÔGLHQHfHlH{H|HHHH HµH¶HŸHØHÙHàHIII/I1I2I3I6IIINIIIII,M>MMMÝMìMñMòMXNõíëõíëõíëâÜ×Ü×ÌÃÌÃÌ뺯ºëŠŠÃÌÃëíëëëëëëëëHhå²!H5Hhò²!H5Hhò²!HHhâ²!H5Hhâ²!HHhã²!HHhã²!H5OJQJ5OJQJHhn£!FH55cHgHHhÏÍ!H57LHgH|HH¶HÙHI0IJIII¹I»IÊIËIJ+JiJÎJÏJãKäKðMñMòMôMNNýýýýýýýýýýýýûýý÷÷÷÷ýýýýýýñïhþÐXNYN#O$OûO
PP'PbPyP~PPJQKQ%S&SkTlT¯T³TUU
VV\\ï\ð\ê^ë^5böáßßßßʹšŠp_N!jHhx£!FH0JË<U!jHh³!H0JË<U'jHh÷²!H0JË56<U!jHhp<!fH0JË<U!jHht£!FH0JË<U6!jHhn£!FH0JË<U!jHhɲ!H0JË<U)jHhk£!FH0JË<OJQJU5)jHhi£!FH0JË<OJQJUHhi£!FHNN;O¹OŽiJ
&FeþEÆ;Ð!&.J
&FeþEÆ;Ð!&.J
&FeþEÆ;Ð!&.¹O1PPMQŽQµQÈQRSJWYxZ[³[{\\×]_>_€aÇaeÓfìfhóihkúlôm n°pr+s÷ïçßÜÖÑÌÇÂœž³š£}xsnic^YTÓiûÿÿÓDýÿÿÓëÿÿÿ
àÿÿÓÙùÿÿÓkûÿÿÓàüÿÿÓËþÿÿÓçÿÿÿ
!çÿÿÓüÿÿÓÝÿÿÿ
PìÿÿÓàÿÿÿ
ÖîÿÿÓ€þÿÿÓìÿÿÿ
:õÿÿÓöÿÿÓªöÿÿÓ=÷ÿÿÓ¯øÿÿÓkúÿÿÓcþÿÿÓíÿÿÿ
?üÿÿWüÿÿŸüÿÿ
{ýÿÿ
Úýÿÿ
Rþÿÿ
¹O1PPMQŽiJ
&FeþEÆ;Ð!&.J
&FeþEÆ;Ð!&.J
&FeþEÆ;Ð!&.MQŽQµQÈQRSJWYxZ[³[{\\×]_>_€aÇaeÓfìfhŽ²°®®®®®®®¬®®°®°®®°®ÓJ
&FeþEÆ;Ð!&.5b6bùbúbeeÈiÚiUl`l^mpm°m±m³oÀouu#u$u:u;uÎxÏx|
|§|š|Ï|Ð|Úè^l 24<ªïXj§«¿ÀÒw©Øê:Hde{|}~ÿ#fîîìêêêÙêËËËêËËËêêêêêêêêêêêêêêêêêËËËêêjHhÐ!&HU!jHh<!fH0JË<U56!jHhy£!FH0JË<UJhóihkúlôm n°pr+s<stt¯tŽt¶tÝtït(wÏxz'z|B|
~«~noIýýýýûýýýùýýû÷÷õûýýýõ÷û÷û÷÷ûýÓ+s<stt¯tŽt¶tÝtït(wÏxz'z|B|
~«~noI¬IYâPi|fr{|©»:úõðêçäáÛÖÑÌáÉÃÀº·Ž®©€áytnkháb_îÿÿÿ
Óÿÿÿëýÿÿôÿÿÿ
êüÿÿÓíÿÿÿ
çÿÿÿÓÆüÿÿÓÞýÿÿÓáÿÿÿ
#óÿÿÓðÿÿÿ
ŒõÿÿÓÃüÿÿÓ&þÿÿÓèÿÿÿ
ùÿÿþÿÿÚÿÿÿ
ûÿÿÝÿÿÿ
æýÿÿÞÿÿÿÓüÿÿÓµýÿÿÓîÿÿÿ
Ùÿÿÿèÿÿÿíÿÿÿ
XÙÿÿÓÿÿÿÓïÿÿÿ
Éúÿÿ%I¬IYâPi|fr{|©»:k>?~¡ýýûýûýýýùûýû÷÷ùû÷û÷÷÷÷÷÷÷÷÷ô$Ófg78y}QRSTUmt¡ŠÆÈhi®¯ßá
êÕÓÊÁ»·©©ob``H*j0JË<OJQJU)jHhãB!H0JË<OJQJU5H*5jTHhÐ!&HU jUv8HhÐ!&H
UVjHhÐ!&HU56cHgHHhÔ£!FHHhÓ£!FH6)jHh€!FH0JË<OJQJU)jHh£!FH0JË<OJQJU!:k>?~¡ÆjkŠºÜ4]yÉ!M
¡k¡¡~¢ú÷ôñîëèåâßÜÙÖÓÐÍÇÁŒ·±©¡
|wrmgbÓãÿÿÿ
øÿÿÓüÿÿÓÿüÿÿýÿÿýÿÿýÿÿýÿÿþÿÿRþÿÿ~þÿÿÓÖÿÿÿ
àûÿÿÓ
ýÿÿýÿÿ-ýÿÿ
Iýÿÿ
rýÿÿ ÓÊýÿÿÓìÿÿÿ
Ùÿÿÿ
ý÷ÿÿÏúÿÿÐúÿÿ/ûÿÿtûÿÿûÿÿ¢ûÿÿ»ûÿÿŒûÿÿ!üÿÿ"üÿÿ9ýÿÿ:ýÿÿûþÿÿüþÿÿÏÿÿÿ
Bþÿÿ&¡ÆjkŠºÜ4]yýýýýýûù÷÷°iF
&FEÆ;Ð!&.F
&FEÆ;Ð!&.ÓyÉ!M
¡k¡¡~¢¢£ž¶Ž²Ž¬¬¬¶¶©ŽŽ²Ž©Ž
€€
Æñà%$ 0ýÓF
&FEÆ;Ð!&.
¡¡¡~¢¢¢¢¢¢¢££O£P£Ñ€Ø€â€ã€êܘܚÜsÜ^MIÜ56!jHh0€!FH0JË<U)jHh£!FH0JË<OJQJUjHhÐ!&HU jUv8HhÐ!&H
UV
5CJH*5OJQJHh£!FH)jHh£!FH0JË<OJQJUjHhÐ!&HU jUv8HhÐ!&H
UVjHhÐ!&HU)jHh£!FH0JË<OJQJU~¢¢£Q£z£}€â€ü€a¥·¥!Š#ŠJŠwššššÅšÙšòšªæª¬ !Ì®H°í°6±¶±]²^²z²7³ü÷òìçâßÚÕÐÍÊÅÂœºµ¯ª£}vnf^[ÊVÓäÿÿÿ|öÿÿ#÷ÿÿ
£÷ÿÿ
ì÷ÿÿ
Óøÿÿ Ó
úÿÿ Óžûÿÿ ¹ûÿÿÚÁüÿÿ
Úóýÿÿ
Ú»þÿÿ Óçÿÿÿ
JýÿÿH^ýÿÿ{ýÿÿHýÿÿ¬ýÿÿÓÙÿÿÿ0ýÿÿÓýÿÿÓðýÿÿÓUþÿÿoþÿÿÓÔþÿÿÓ×ÿÿÿ
.öÿÿÓkþÿÿÓÓþÿÿíþÿÿ £Q£z£}€â€ü€a¥·¥!Š#ŠJŠwššššÅšÙšòšªæªýûýýùýýýù÷ýòðòðîý§FÚ
&FEÆ;Ð!&·ðH$€ðÓã€÷€ø€ù€ú€û€ü€Ÿ¥Â¥wšxššššššš©šÁšÂšÃšÄš©©©!©'©.©ÉªÖªZ«e«¬¬r²®Â®ß®÷®¯ ¯±"±f±v±ïáÓŸ·µÓ€ÓÓ
wÓµµµµµµµµµµµµµjº§HhÐ!&HU jUv8HhÐ!&H
UVjØ¡HhÐ!&HU jUv8HhÐ!&H
UV5CJOJQJ)jHh¡£!FH0JË<OJQJUjHhÐ!&HUj@HhÐ!&HU jUv8HhÐ!&H
UV.檬 !Ì®H°í°žqlgggÓ
&F
&FFÚ
&FEÆ;Ð!&·ðFÚ
&FEÆ;Ð!&·ðí°6±¶±]²¶m$H
&F8EÆ;Ð!&·ðH
&F8EÆ;Ð!&·ðH
&F8EÆ;Ð!&·ðv±²²°Ž»Žíµ¶ì¶·žžÚÈÊZË[ËoËpËqËrˊ˧ËÍÍÓÏÙÏÑѥъѧњѩѪÑÀÑÁÑÂÑÃÑÒÒMÒ]ÒïÒÿÒÓ*Ó^ÔnÔtÔÔÕÕÕ,Õ.Õ]ÕýýýýçÞп±Ð ýÐÐÐÐÐÐýýýýýý56!jHh4C!H0JË<U!jHhµ²!H0JË<Uj»HhÐ!&HU j
Uv8HhÐ!&H
UVjHhÐ!&HUHh%ÒŠH*jHhïC!H0JË5;<>*U56]²^²z²7³RŽ|µ9·ë·ì·žž9ž?ž@žOžPžžËžãž
¹8¹d¹e¹¹¹³¹È¹Ê¹Ë¹ýûùùùùùôôýòòòòòòòòòòòòòòòòòòÔ
&FÓ7³RŽ|µ9·ë·ì·žž9ž?ž@žOžPžžËžãž
¹8¹d¹e¹¹¹³¹È¹Ê¹Ë¹ºTºiºkº ºÌºøºýºûöñìæàÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[f÷ÿÿ÷ÿÿŸ÷ÿÿó÷ÿÿõ÷ÿÿ
øÿÿGøÿÿøÿÿøÿÿøÿÿ«øÿÿÕøÿÿ×øÿÿùøÿÿúøÿÿ&ùÿÿQùÿÿ{ùÿÿùÿÿÞùÿÿúÿÿúÿÿúÿÿúÿÿ%úÿÿ[úÿÿ\úÿÿ
Ôrúÿÿ
Ôsúÿÿ Ó%ûÿÿÓâüÿÿÓþÿÿÓ'ÿÿÿ!˹ºTºiºkº ºÌºøºýºÿº»» »;»V»[»]»^»»»š»ß»Œ7Œ_ŒlŒ£ŒšŒªŒ«Œýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýºÿº»» »;»V»[»]»^»»»š»ß»Œ7Œ_ŒlŒ£ŒšŒªŒ«ŒôŒ÷Œœ6œOœuœœŒœÝœŸŸŸûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[NôÿÿSôÿÿôÿÿ¢ôÿÿËôÿÿéôÿÿõÿÿ(õÿÿGõÿÿgõÿÿjõÿÿ³õÿÿŽõÿÿ¶õÿÿ»õÿÿòõÿÿÿõÿÿ'öÿÿVöÿÿöÿÿ¶öÿÿÚöÿÿÜöÿÿ÷ÿÿ÷ÿÿ÷ÿÿ÷ÿÿ#÷ÿÿ>÷ÿÿ@÷ÿÿ^÷ÿÿ_÷ÿÿa÷ÿÿ!«ŒôŒ÷Œœ6œOœuœœŒœÝœŸŸŸ;Ÿ<Ÿ?Ÿ{Ÿ~ŸŸŸ¥ŸÁŸæŸ¿1¿k¿l¿m¿¿Ÿ¿ýýýýýýýýýýýýýýýýýýýýýýýýýýýýýŸ;Ÿ<Ÿ?Ÿ{Ÿ~ŸŸŸ¥ŸÁŸæŸ¿1¿k¿l¿m¿¿Ÿ¿ï¿ÀOÀPÀuÀÀÌÀâÀÁÁ1Á2ÁzÁ£Á€ÁºÁûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[ºðÿÿ»ðÿÿäðÿÿ,ñÿÿ-ñÿÿLñÿÿMñÿÿ|ñÿÿñÿÿÃñÿÿéñÿÿòÿÿòÿÿOòÿÿoòÿÿ òÿÿÆòÿÿñòÿÿòòÿÿóòÿÿ-óÿÿHóÿÿxóÿÿóÿÿ¹óÿÿÞóÿÿßóÿÿàóÿÿãóÿÿôÿÿ"ôÿÿ#ôÿÿLôÿÿ!Ÿ¿ï¿ÀOÀPÀuÀÀÌÀâÀÁÁ1Á2ÁzÁ£Á€ÁºÁÚÁ
Â?ÂDÂFÂGÂÂãÂ!Ã"Ã8Ã:Ã;ÃýýýýýýýýýýýýýýýýýýýýýýýýýýýýýºÁÚÁ
Â?ÂDÂFÂGÂÂãÂ!Ã"Ã8Ã:Ã;ÃÃëÃ×ÃÛÃ&Ä)ÄIÄrÄvÄÀÄÃÄåÄÿÄ&Å*Å]ÅbÅdÅeÅûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[úìÿÿüìÿÿíÿÿ4íÿÿ8íÿÿ_íÿÿyíÿÿíÿÿíÿÿèíÿÿìíÿÿîÿÿ5îÿÿ8îÿÿîÿÿîÿÿ³îÿÿÔîÿÿ×îÿÿ#ïÿÿ$ïÿÿ&ïÿÿ<ïÿÿ=ïÿÿ{ïÿÿÆïÿÿðÿÿðÿÿðÿÿðÿÿTðÿÿðÿÿ€ðÿÿ!;ÃÃëÃ×ÃÛÃ&Ä)ÄIÄrÄvÄÀÄÃÄåÄÿÄ&Å*Å]ÅbÅdÅeÅ°ÅÆDÆFÆbÆÆÌÆÑÆÓÆýýýýýýýýýýýýýýýýýýýýýýýýýýýýýeÅ°ÅÆDÆFÆbÆÆÌÆÑÆÓÆÔÆõÆÇKÇÇÇÇöÇøÇ?È@È\È^ÈvÈÈÈÈÙÈÚÈÿÈÉ"É>ÉcÉÉûöñìçâÝØÓÎÉÄ¿ºµ°«Š¡~ytoje`[ûèÿÿ éÿÿ<éÿÿ]éÿÿ_éÿÿéÿÿ
éÿÿÈéÿÿÊéÿÿÍéÿÿèéÿÿêÿÿêÿÿêÿÿêÿÿfêÿÿhêÿÿêÿÿÞêÿÿëÿÿ@ëÿÿiëÿÿëÿÿëÿÿëÿÿëÿÿÉëÿÿüëÿÿìÿÿìÿÿ\ìÿÿ®ìÿÿùìÿÿ!ÓÆÔÆõÆÇKÇÇÇÇöÇøÇ?È@È\È^ÈvÈÈÈÈÙÈÚÈÿÈÉ"É>ÉcÉÉÉÉɬÉÖÉýýýýýýýýýýýýýýýýýýýýýýýýýýýýýÉÉÉɬÉÖÉóÉÊ\Ê^Ê_ÊÊÊÊÊÊËÊêÊëÊùÊYËZËsËtËuËBÌ_ÌmÍÐÆÑ.Õ@Ö`ÖÙÙ±ÚûöñìçâÝØÓÎÉÄ¿ºŽ®©£}xsnhc]XÓDÙÿÿ
ØWÙÿÿ ÓþÛÿÿ
ØÜÿÿ Ó0ÝÿÿÓàÿÿÓXâÿÿÓñäÿÿÓÿåÿÿ
Øæÿÿ ÓéæÿÿêæÿÿëæÿÿçÿÿçÿÿÓeçÿÿ
Øsçÿÿ Òtçÿÿ
Ôçÿÿ
Ôçÿÿ ÆçÿÿÇçÿÿÈçÿÿÿçÿÿèÿÿèÿÿEèÿÿkèÿÿèÿÿ²èÿÿËèÿÿÌèÿÿÎèÿÿÑèÿÿ"ÖÉóÉÊ\Ê^Ê_ÊÊÊÊÊÊËÊêÊëÊùÊYËZËsËtËuËBÌ_ÌmÍÐÆÑ.Õ@Ö`ÖÙýýýýýýýýýøøöñïíêêíïñïïïïïñï$ÓØ
&FÒÔ
&F]ÕjÕ&×2×m×|×»×Ê×'Ø7ØuØØÐØßØöØÙAÙiÙvÙwÙÚÚÚÛ%Û±â²âSéTéjékéléméoépééééééé¢é£é€é¥é«é¬éÂéÃéÄéÅéöé÷é2ì5ììì€ìýýýùýýý÷îÝÖÅý°¢¢¢¢¢¢¢¢¢¢¢¢ýý!jHhÄ£!FH0JË<UjHhÐ!&HU)jHhEC!H0JË<OJQJU!jHh;C!H0JË<U
j0JKU!jHh9C!H0JË<UHhAÐ!&H65659ÙÙ±ÚëÜÞ_ßyߎâµâÀâqãrãÉã
äEäFäGä|å}åÄæÅæ
çç]ç^çççúøøøøòòìòòòòììêææòòêêêêêúú p0ý 0ýÓØ
&F±ÚëÜÞ_ßyߎâµâÀâqãrãÉã
äEäFäGä|å}åÄæÅæ
çç]ç^çççVêêîóîïvï,ð-ðöñ÷ñóó%óÞó$ôûöñîëèåâßÜÙÖÓÐÍÊÇÄÁŸ»ž²¬§¡}zwtnfŸÿÿ
9¿ÿÿ N¿ÿÿO¿ÿÿgÀÿÿhÀÿÿ1Âÿÿ2ÂÿÿèÂÿÿ
[Ãÿÿ kÃÿÿÓGÄÿÿÓÈÇÿÿ
ØÈÿÿ Ó¿Êÿÿ
ØÐÊÿÿ
ØËÿÿ ËÿÿPËÿÿQËÿÿËÿÿËÿÿáÌÿÿâÌÿÿÎÿÿÎÿÿÎÿÿTÎÿÿÎÿÿìÎÿÿíÎÿÿÏÿÿ©ÏÿÿªÏÿÿåÒÿÿÿÒÿÿÓÂÓÿÿÓsÕÿÿÓ×ÿÿ'çVêêîóîïvï,ð-ðöñ÷ñóýøýýö¯höccc$ÐF
&FEÆ;Ð!&) F
&FEÆ;Ð!&) Ø
&FÓ€ì§ìØìÙìïìðìñìòì0í3í4í7ííí¶í»íðíþíîîSîVîWîZîîîýîïï©ïŸïÁïðð!ð*ð@ðFðTðaððð©ðœðúðñ\ñkñpññŒñ¿ñsòvòòòíòðòóóóó ó#óBóVóÚóÝóöóùó'ô;ô|ôôôôôôÌôÞôýôõõõYõZõpõqõrõsõ¡ø¯ø;ùdùeùýïïïýýýíýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýýïïïýíï6jHhÐ!&HU5^óó%óÞó$ôûù²kF
&FEÆ;Ð!&)F
&FEÆ;Ð!&)Ð$ôôõõ!ö\ö>÷g÷÷¥÷Š÷;ùdù}ùùú'úOúhú
úúü/ü3ü^ü|üøüúüûüüüþüÿüýý÷ïìçáÜÖÎÆßž³š£~xrmjgda^[X^µÿÿ_µÿÿ`µÿÿbµÿÿcµÿÿdµÿÿfµÿÿÓâµÿÿ
ضÿÿ
Ô+¶ÿÿ /¶ÿÿ
ÔO¶ÿÿ ÓÍ·ÿÿ
ØÙ·ÿÿ
Øö·ÿÿ Óžÿÿ
Ø7žÿÿ ÓPžÿÿÓÅžÿÿ
Øážÿÿ Óúžÿÿ
Ø#¹ÿÿ Óžºÿÿ¹ºÿÿÛºÿÿ
÷ºÿÿ
»ÿÿ ÓŒÿÿ
Ø=Œÿÿ ÓBœÿÿCœÿÿÖœÿÿ
:Ÿÿÿ
!$ôôõõ!ö\ö>÷žqomhmØ
&FÓF
&FEÆ;Ð!&)F
&FEÆ;Ð!&)>÷g÷÷¥÷Š÷žq*(F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.F
&FEÆ;Ð!&.Š÷;ùdù}ùùú'úOúhú
úúü/ü3ü^ü|üøüúüûüüüþüÿüýýýýýýýýøýøýýøýøøýóñóøýññññññññññññÔ
&FØ
&FÓeùyùzù{ù|ù}ùùúú#ú$ú%ú&ú'úOúPúdúeúfúgúŠú§úœúŸú¿úÀúü·üøüùüüüýüýýýïáÓÑÓÀ²ÓÑÓ¡ÓÓÓÓugjYHhÐ!&HUjSHhÐ!&HUjæHhÐ!&HU5jÓÚHhÐ!&HU jUv8HhÐ!&H
UVjÎHhÐ!&HU j
Uv8HhÐ!&H
UV6jHhÐ!&HUjÿÂHhÐ!&HU jUv8HhÐ!&H
UV"ýýýýýý
ýýKþeþ¹gøh ÇF ]
VWXnpÄÆæüùöóðíçâÜ×ÒÌÇÁŒ·²¥
}xurolifc`]V£ÿÿx£ÿÿ£ÿÿ£ÿÿî£ÿÿð£ÿÿ€ÿÿ€ÿÿ€ÿÿÓ¥ÿÿÓŸ¥ÿÿ¿¥ÿÿŠÿÿ
Šÿÿ
H§ÿÿ
Кÿÿ
Eªÿÿ
ÓöªÿÿÓM¬ÿÿÓf¬ÿÿÓÂÿÿ
ØÍÿÿ ÓÜ®ÿÿ
Ø÷®ÿÿ Ó¥¯ÿÿÓù³ÿÿ
ØŽÿÿ ÓGµÿÿ
ØTµÿÿ VµÿÿWµÿÿXµÿÿZµÿÿ[µÿÿ\µÿÿ#ýýý ýØÛøù
¡§
0
~
HTV*/:qt"-¶¹ '?Qhlv~FIx~ §±ÇÐî÷LU\nAN`c
©ÀòäâÔõÔâ³³³¯³³³³³³³³³³³³³³³³³³³³³³³³5CJ5jÔHhÐ!&HU jUv8HhÐ!&H
UVjHhÐ!&HU6jKÅHhÐ!&HUjHhÐ!&HUEý
ýýKþeþ¹gøh ýøöøööøöøöööö¯F
&FEÆ;Ð!&·ðÓØ
&F ÇFžq*F
&FEÆ;Ð!&
·ðF
&FEÆ;Ð!& ·ðF
&FEÆ;Ð!&·ðF ]
VWXnpÄÆæ%'(*ž¶ŽŽ¶¶¶¶¶°¶ª¶¶¶¶¶¶¶ÐÐÐÓF
&FEÆ;Ð!&·ð%'(*+-;P¡$ÂýÊ@Ž¿æ\Öé!Û" %&&a)))üùöóðíêåßÚÕÎÄŸŽ®€zpf\YVPMÑÿÿ
Ôýÿÿ ÁÿÿÂÿÿÖUÿÿ
Öÿÿ
Öuÿÿ
Öÿÿ
Öÿÿ ÓxÿÿÓÿÿتÿÿÖÿÿ
Öÿÿ
ÖaÿÿÖÿÿ
ÖKÿÿÖ:ÿÿ
Öœÿÿ Ó ÿÿÓ#¢ÿÿ
Ø1¢ÿÿ Ó3£ÿÿ4£ÿÿ6£ÿÿ7£ÿÿ9£ÿÿN£ÿÿP£ÿÿR£ÿÿ*+-;P¡$Âýûöûû¯h_ Ö
&FhþFÖ
&FEÆ;Ð!&.FÖ
&FEÆ;Ð!&.Ø
&FÓÀ),;>L[covÎÑÒÕstuv¿ÈÉÊ ÆÉÓëó*.^a»ŸÆÜàñÑÛø")0)é)ò)W*_*€,ª,Q-\-Ý-â-^._.@/A/G/H/J/K/L/S/ýýýýýýýùôýùýýýýýýýýýýýýýëýýýýýýäÍÃÍ·ÍÃ0J
B*CJOJQJmH0J
B*CJOJQJ-jHhÐ!&H0J
B*CJOJQJU
j0JKUHh²!H 56>*565HÂýÊ@ž¯hFÖ
&FEÆ;Ð!&. Ö
&FhþFÖ
&FEÆ;Ð!&.@Ž¿æ\Öž³±±jFÖ
&F EÆ;Ð!&.ÓØ
&FFÖ
&FEÆ;Ð!&.Öé!Û" %žq*FÖ
&F EÆ;Ð!&.FÖ
&F EÆ;Ð!&.FÖ
&F EÆ;Ð!&. %&&a)))))È)É)Í)Î)è)é)ó)ž¶°«¶¶¶«¶¶¶«¶¶Ô
&F
ÆZFÖ
&F EÆ;Ð!&.)))È)É)Í)Î)è)é)ó)W*_*Ù*+,€,¯,Q-\-Ý-ã-].^.õ.ö.//?/@/L////Ÿ/¿/ý/þ/ÿ/²0³0AKDKKKLKDLLLuMvMwMüùóðíêäáÞÖÑÉÁ¹±¬€J
{ÿÿ
ÿÿ
ÿÿ
ÿÿ ¯
ÿÿ
º
ÿÿ Dÿÿ
Ãÿÿ
ÿÿ
ÿÿÿ
ÿÿ kÿÿ
uÿÿvÿÿ
Ôÿÿ ÿÿÿÿÿÿ
ÔËÿÿ ÌÿÿÐÿÿ0ó)W*_*Ù*¶dH
&F8EÆ;Ð!&
·ð
&FÐ0ýH
&F8EÆ;Ð!&·ðÙ*+,€,¶m$H
&F8EÆ;Ð!&·ðH
&F8EÆ;Ð!&·ðH
&F8EÆ;Ð!&·ð€,¯,Q-\-Ý-ã-öš_öH
&F8EÆ;Ð!&·ð
&FH
&F8EÆ;Ð!&·ð
&FÐ0ýã-].^.õ.ö.//?/@/L////Ÿ/¿/ý/þ/¶Ž²Ž®Ž©Ž¢Ž¢ŽŽJ$ J$e
ÆJ$hh
ÆJ&`ðÿ$hhMH
&F8EÆ;Ð!&·ðS/T/n/o/}/~/////////Š/§/µ/¶/Å/Æ/à/á/ï/ð/ò/ó/÷/ø/ú/û/ÿ/00000²0³0É0B1C1D1E1[1òòïòØÎØÂØÎòòïòòòïòòòïòò¹®ò¹¹òzHhk<!fHHhݲ!HHhܲ!HHhMÐ!&HjHhÚ²!H0JËUHhÚ²!H0JËHhÚ²!H0J
B*CJOJQJmH0J
B*CJOJQJ-jHhÐ!&H0J
B*CJOJQJUmHjHhÐ!&HU+þ/ÿ/D1ð12æ2F33ö3H4ð4>55ø68N8ñ8ê9{:Ÿ:é:.;r;=<_>î>AåACBCýûûûûûûûûûûûûûûûûûûûûûûûûûûûûÑ[1]1^1_1}1~1111€1·1¹1ï1ð1ñ12 2
2222 2+222j2u2}2222222«22®2¯2æ2ç2ôæÖÍÄÍÄÍÄ»ÄÍæ»°æ »»»xmxæjæcæ
j0JËU0JËHho<!fH6Hho<!fHHhn<!fH6Hhm<!fH6Hhn<!fHjHhm<!fH0JËUHhm<!fH0JËHhm<!fHHhl<!fHHhk<!fHjHhk<!fH0JËUjHhÐ!&HUHhk<!fH0JË&ç2ý2ÿ233'3E3F3G3]3_3`3a3333°3²3³3Ž3Ÿ3ô3õ3ö3÷3
44444öëÝÍöÄÝ»°Ý »ÝÝ|sÝj_ÝOjjHhe£!FH0JËUHhe£!FH0JËHhe£!FHHh£!FHjHh£!FH0JËUHh£!FH0JËHh£!FHjHh{£!FH0JËUHh{£!FH0JËHh{£!FHHhd£!FHjHhc£!FH0JËUjHhÐ!&HUHhc£!FH0JËHhc£!FH4*4G4H4I4_4a4b4c44ï4ð4ñ45 5
55
55;5=5>5?5U5W5X5Y5e555öíßÖË߻ֲߩߩ
©
ß|qßa|XOHháÍ!HHhàÍ!HjHhk£!FH0JËUHhk£!FH0JËHhk£!FHHhj£!FHjHhi£!FH0JËUHhi£!FH0JËHhi£!FHHhh£!FHjHhg£!FH0JËUHhg£!FH0JËHhg£!FHjHhÐ!&HUHhe£!FHHhf£!FH55555°5²5³5Ž5 6
66w66÷6ø6ù67777 7-777^7_7e7m777³7»7Œ7888ñèÚÑÆÚ¶ÑÑ€ÚÚwnenenene\eneÚHhr£!FHHhs£!FHHhp£!FHHho£!FHjHhn£!FH0JËUHhn£!FH0JËHhn£!FHHhͲ!HHhʲ!HjHhɲ!H0JËUHhɲ!H0JËHhɲ!HjHhÐ!&HUHhl£!FHHhk£!FHcHgH#88888M8N8O8e8g8h8i8}888×8Û8ì8ï8ð8ñ8ò89
999!9&9'9<9=9X9Y9öëÝÍöÝÄ¹Ý©Ä Ý
zÝj
aXaXaXHhú²!HHhù²!HjHh÷²!H0JËUHh÷²!H0JËHh÷²!HHhr<!fHHhs<!fHHhq<!fHjHhp<!fH0JËUHhp<!fH0JËHhp<!fHjHht£!FH0JËUjHhÐ!&HUHht£!FH0JËHht£!FH Y9é9ê9ë9::::z:{:|:::::œ:Ÿ:¿:Õ:×:Ø:Ù:è:é:ê:;;;;;;;-;.;/;E;G;H;öèßÔèÄßè»°è »èè|èè|ssèj_èHh<!fH0JËHh<!fHHhz£!FHjHhy£!FH0JËUHhy£!FH0JËHhy£!FHjHhx£!FH0JËUHhx£!FH0JËHhx£!FHjHh³!H0JËUHh³!H0JËHh³!HjHhÐ!&HUHhû²!H%H;I;J;q;r;s;;;;;;¡;¢;;É;Ê;<<#<<<=<><T<V<W<X<š<º<¿<Ã<Ñ<Ø<Ú<ðçÞÐnjЬǣÇÇ££Ð}Ðmd[[Hh€!FHHh€!FHjHh€!FH0JËUHh€!FH0JËHh€!FHHh
£!FHHh£!FHHh£!FHjHh£!FH0JËUHh£!FH0JËHh£!FHjHhÐ!&HUHh<!fHHh<!fHjHh<!fH0JËU Ú<=#=V=q====Ž=^>¢>£>µ>¶>Û>ì>í>î>ï>??? ?r?{?}?@'@(@+@1@öíöäÛÒÉÛÉÀ·À·ÀÉ·© ©
|sjsasVHh]£!FH6Hh]£!FHHh_£!FHHhìB!HHhæB!HjHhãB!H0JËUHhãB!H0JËHhãB!HjHhÐ!&HUHhDz!HHhIJ!HHh€!FHHh€!FHHh€!FHHh€!FHHh€!FHHh€!FH1@2@3@;@?@@@A@@¬@@ž@Á@Â@Ö@ß@à@á@ A%A2A\AAAAŠAšA©AªAåAæAüAþAÿAóêáÖÊáÁž¯ê€óê€óê{x{q{h]{Hh£!FH0JËHh£!FH
j0JËU0JËjHhÐ!&HUHh£!FHHh£!FHHh^£!FHHh]£!FH6Hh\£!FHHhôB!HHhìB!HHh£!FH6H*Hh£!FH6Hh£!FHHh]£!FHHh]£!FH6H* ÿABBB(B:BBBCBDBZB\B]B^ByBBËBCCCCC'C)C*C+C,CFCOCCÒCðçÞçÞçÐnjЬǡÐ{pÐ`{WLW{Hh £!FH6Hh £!FHjHh£!FH0JËUHh£!FH0JËHh£!FHHh£!FH6Hh£!FHHh£!FHHh£!FH6jHh£!FH0JËUHh£!FH0JËHh£!FHjHhÐ!&HUHh£!FHHh£!FHjHh£!FH0JËUÒCÛCåC<D=DMDNDkDwD|D}DD¯D°DÂDàDáDçD÷DøDùDEEEEõìãÕãÌãÁ¶ã̶̀sh[MhMHh¬£!FH5H*mHHh¬£!FH5mHHh£!FH5Hh«£!FH5H*mHHh«£!FH5mHHh€£!FH5mHHh«£!FHHh€£!FHHh¢£!FHHh£!FH5Hh£!FH5Hh£!FHHh£!FH jJðmHHh£!FHHh£!FHHh£!FH6C²DáD0EE¿E FZG'HTIäJ KMKLKMuMvMwMýýúýúýýýýýýýýýýøøÑ$ÑEEEEEE0E6E?E]E`EEEEE¡E¢E£EE®E³E»EŒEŸE¿EÀEÅEÎEñEôEüEFF FóåÚóåÚÑƜƜ°Æ¢°¢Æ°¢ÆÆwncwcwcwHh±£!FH5Hh°£!FHHh±£!FHHh°£!FH5Hh¯£!FH5Hh¯£!FH5H*Hh®£!FH5H*mHHh®£!FH5mHHh®£!FHHh®£!FH5Hh£!FHHh£!FH5Hh£!FH5H*mHHh£!FH5mH! F
F F"F#F$F`FaFFFFŸF¿FÀFXGYGZG[GqGsGtGuGGGH%H&H'H(H>H@HAHBHcHòéÞòÎéÅéÅéÅŒ³ªéò¡ò¡{¡{¡òrgòWrjHhïC!H0JËUHhïC!H0JËHhïC!HHh¡£!FH6jHh¡£!FH0JËUHh¡£!FH0JËHh¡£!FHHhA€!FHHh;€!FHHh4€!FHHh3€!FHjHh0€!FH0JËUHh0€!FH0JËHh0€!FHjHhÐ!&HU!cHlHHHHHHHH¬HÕHìHSITIUIkImInIoIŒIJ¥JãJäJåJûJýJþJöíäíäÛíÒÇŒ±Œ££vmd£[P£Hh4C!H0JËHh4C!HHh¹²!HHhž²!HHh·²!HjHhµ²!H0JËUHhµ²!H0JËHhµ²!HjHhÐ!&HUHh«£!FH5Hhª£!FH5Hh©£!FH5Hh©£!FHHhñC!HHhðC!HHhïC!HHhš£!FHþJÿJK K!K7K9K:K;KAKDKKKLKMKNKdKfKgKhKÃKÚKâKôKÿKLLLLLLLL1L3L4LðçÙÐÅٵЪ¡ÐÙÙ}ttktktktkÙbWÙHhEC!H0JËHhEC!HHhAC!HHh@C!HjHh;C!H0JËUHh;C!H0JËHh;C!HHh;Ð!&HHh9C!H5jHh9C!H0JËUHh9C!H0JËHh9C!HjHhÐ!&HUHh4C!HjHh4C!H0JËU"4L5LDLLLlL~LM2MJMKMLMbMdMeMfMtMwMðçÞçÕçÌÕŸµªŸµjHhÄ£!FH0JËUHhÄ£!FH0JËHhÄ£!FHjHhÐ!&HUHhFC!HHhGC!HHhBÐ!&HHhEC!HjHhEC!H0JËU? 0
0000@&P P°. °ÈA!°S"°S#t$t%°7°Ë°S< 0
000@&P P°. °ÈA!°S"°S#t$t%°7°Ë°S6 00@&P P°. °ÈA!°n"°n#t$t%°7°Ë°S- 000&P P°. °ÈA!°n"°n# $ %°7$&P P°. °ÈA!°n"°n# $ %°7û&P P°. °ÈA!°n"°n# $ %°7ÒÔÐÐÐÐÐÐÐÐÐ...)()()()()()ê<Ddïffð<²
ð
CðA¿ÿð2ðZ<F÷~n=%k÷41ÿ6<D`!ð.<F÷~n=%k÷416VÿÿÿÿY =8¬ü;þx]Œže¶œbh¥€D@JDZ$¥$€Sî€EP)éîÎM7HKKÀÎŒïûÇ÷Éq²gÏÌ=÷Ü÷Z׺ֳ·šÄñ7²Ä±ÿp+áWìË ~ŸJ`/ùïU^eHIé®->íÞ©ëûé+«[§rYIõß#Y€t§?íÞŠiûé{µéÞ:}çnͺ¶éÜ=G¥6;uïÚ©cféß{/OxSî¢áØÑ}}5úK5ú¯qùúÔ$úïçåT8|ý×ô?þû]ý¿F1Þ'äkfõß³úµÿŒûÏȱþí¿#Ëÿ5²ËÿfÜTÃÉ2YÊßÕ}
|
}äô5 Rú:IàDáÛ*¿Ûv¹l;ågÛ+l¿l³Ã²ÚÉB;%Óí|gd]ö«ô²ÒÁþfö·Ô±ÇRÕ^ÈfZÄâê»P߶dÖÒhrËš¯XV
,>Õüz_èïZZ/kE=£ÕõšöÖù:H§ëH¬ãô[«Ù:Dj?]¯œtvÑÚNOjýEèM§÷ŽŠ>ÓÊË>ÒDVZ_·búÖÜ_Û»ú¡e×*ܵŸeÖæ^;3ŸJ¿²:Îê4fžÀ^ÑU_·2ãèif
îè3&¶ÿ+Iý©dþXÂh^õûŒŸ/=ü/)
xúß\ó·<³ä.+rÍÊi8ÈX[scÏã>Sžß8î;9|nµ#+Õ¹Õekiæ\вiNË©xVP_µ"êVRi9œÃÊýÊÊÓ:¬^#Ý£Í4õYÍ:-dœŠ³nY¿1:Z²_°®=tŠvàh]ÎõC=®%¡ #åÑ?4þ£õ
ŠÑž¬Pbfö:³Ìij3ûü<M »/±ß5Ù÷FvUZÙ/ÒÅÎI?bc(1ò)vPæ;Ë¡ÍÄÓÛ"Çmübë䊿mŒ°xLîKäM_$Ù¡ /ÒPÙçIÉëéÆí(cdæŸiún°P³«õ F3û5mpBS5IpC÷4VðäeO=ýí)íOÏ`7=»]öŒvÎÚq/cŒmöƶÖ[Úbïhsœ¿MðÁ6ÚGÙÿÖúùÖÃgX;gÍ|Õó5VÝ7Y9ßn%|¯å÷ÃÝOXF?m©ü¢%ôkø
{j·í/»g¿ÙC»`Oìšýk{L|GWX\FïS9{¬%ö¡ÔûX
ïÄ-,µ7°4^ÍÒ1»t^ÈÒ{.FÏbýoÍìÇ4£ï
eÞgÁ÷ÎGjš©œ§Šò¶Âk2¯¡Iœ¬&ô¢úçÑøYc{*5U_ 3Oí<²ÛòÀ.£'ä6Y~]ºÄηyrÊŠÈ1GÌ~%;/qÛYö[WÞÆ÷¿$GÉE(Wl¶Ü°%\¿AîÙnyH<±óšÑ
1 ¿ø9M9å`~
gæ\¹7äZó<Ýy¶~ÅkVK4ocÃ/Âߌ~),+ëuÉÂúdf2²^Y·t¬_:ïÂöa-²ŠcYÛp°Þ«X÷pý÷±ÇÙöÈnÚ»owywÛbûuvãWeÔSÓXAßo%}§UdÏk²÷ì^'b¢7±1ÐÇÙpbå[bf¢÷µÞÐvx
Ûç¥ì³ûÅóØoþ¶ýái퟿F,&0ÄÞbÑ;Äê5bö4±{X3»ôí`#1œØMÏÔQ¬1ßÙÃø_Ë:mGc¶Jjß"©PëõN Qòø«ÐU¬ÿ2ö!d<¿mÜ¿Øß[pÃæ°çsЧYìå,ö}û>ýý}þý*[`MY0×ßÃx
Ñ;ŸâÚÁð%c
þý9tåÞ¡#1ÕÚùmQÖ€9ñÖuhJµiR|Bü|j4&G
Ë(MãÇ{
/8WŽ)Ô<"®¶DC[¢áQ«Öèh[tœ-ZÚkßÙÒiW4µ+Uš;ºÚ3"º
rèËùÐâBÔB:ÌÞ×V\ÇXß[š€?XjU¡ºþs¬Z^GY=h ˬ®h¢kìS]gÍtl±VÔVºÓÚénØoš5ôuÑcpºQwBzèyë¥àõÖë}ôõ£õÓ¿ìœÿØ@}Omù<HÅh\ïCɳ¡äÿpòj8ñ2Rß®e¡<Ç*AÎ µ}Öš
¡MàSr±Žò>Ð[ÛDôÒÐÉ»i7ïŽGD;íÑF{{+h¡}Œ4Ñ~Þè^jê@¯Eyý>äãX^ÈÁ¹Ù 3×dd¬ô±Ó@jî
iO
Ç+_Ûy\Íü
4£&
MšÏMü©íHM¿)UüªTòËRJùùÀOKq?%E¡|Ã÷Rß÷cÛå?9¶ÛK~ídï%äÞ+Œ
o Ï6PÍÖgëpgkpPÿ©p÷á/ªÜ]žCÜëäáždȹEäÜŽty7OöÂnòg¬!æÀ,^ÿßsl4âÜ0kG,!ïwËÈ»Ò>çÞE¬ÐêÛ|ë±<Ü {ÉÃÒ2âùxþâõ}øcá)çþF>| ɧÄJ)È©TúYD:ò*ö'ßúkȵø°/É·Á9tù6Ú
_ïë·äÚxL®M(«³È·90[@Î-"ßÀ*òm
l ß6Áòm+ì&ÏöÃaòìXD=E®³äÚyžhÈNäVòªÞ çnÃòî.üEÞý
ÿwOá_rï¹ð
$$7A
r%3d%w
@!^2«8·fDÑëMõ"Çzc=ȱnÄnHò1ÝZëBb?€¹P* ¯KAå<²Y 39Ò3V:HC€Täp
HFN'
ÄÜ3!÷qKHlæ(ðBêá{ëOu &ùTO[ªáq«àw«øRü*¥üWžJn]&·.ã
Ï[çÈ3|ËC®å¬äZf?L$ÇöGyæ[üšŸ
Ò€Á}}%ø~ÓøÁïp_ãá
ÆĶ o$€TÓöÂSA:û×ÓSa3ÛcÏjÿx6\_.ªn^ûËóáþ
R
Ûï^Ì®úžÀšÐÕí׎^Çx=;Øïl·jÛœmÅOlòV¶ÁÛØog+Œ-Á§-ÀcÌñn6Ã{ØTïe?Àxïmcñ£œ îñÜÁÖÇZ/è欱ŠÐoRªøp<Êp<ÊPŒÉP3ýcCp$ìܲv
.ÚvÚúÙ 8l}l¯õ¶°ÅzÙ:ëa+¬-±.6fX'jì{kgcŽ6Ú§\ÝÄ>³FÖÕX{«c¶5µÖت[]«l5¬¢U±rVÞ>Ž2VÒ[ +dE,¶<ß²Y^ËÌ«ôÃÒð.
e±€Ñ^±tïIJTöRÙ#úŒ{ôwèõn©ÙiýKOèz~o¿^ÕtoÛéùè.]DÇ2K×ê]©Séô&Ó|O×7îe,à7t0£èGè×:¿ëWú¥àO_íOÇØæsí€Ñ÷ôÔVÚš+MgzÃZ[ÛÓµ¥OjK¿Ôn³¥ÂÚŽ¹Ÿ«M5'dÒOôMH©5 ÜOô\¢w>'€¹¢zXZê^Ø-uŽÕØ(íutÔÕÒYKW],ÝuŸôÔ¹òÎÏuºôÕ)Ò_'Ê _ê8¡#d¬ñÚ_Ÿ×Ÿ2Y?YÚUæigY€e¶ÚVÖhkY§-e¯§òý8þ=ç}«Ýåýñ1î(î3ûMàŸžÿæ1ùÌfnsa!s]ÊW2ÿÕ°çÙ̳mƺöJC=G€>ÏY_OK]¹®^YYº2h}}ÞÑÞc
B1Ö$|È:VdM«BMÖžëÝuÿ=hÁ^ŽcO:±7ÝØ£ÞìW_ö-ÜůØÇŒúœýwy7
=Éwæ
åÄÄjâdΡË]AϺøY§t^Öô®±SúXÏÒ»^T±ëÄßmâðŠ²çÆšMôÆ'f»©åtDvf+hYñ\Vï$ÞK÷嬹PšDnÔ Gê/ùÒŒiDþ|J5#ZWmÈÖväYMþ}K~ONN%7g£ÈÕeäí*ÎÜ[ÉçdäA®:BŸó\} ®ÛpzèÀHºÈÑô*£éLÆ cèÇ¢cÑ1Ör¬tòt##éV£9Cm(DKÆÀ·èÎ÷èÏdŽhº4æ¡SKЬ°
[mBÓ¶¢m;ѹœ°Ý;þCO£çÐÆèäe¯M]ýM-¶FcK¢µÅÐÜÂhoA48ZMÎ>gC§³ ÙÑnt"H
©,~Ì^ Ã+0%þ¥<êÀÉšç¿)?Ë 9.ä«rZnòþ/9*ÿÈ!y!û$îWçääcZòñ-b<'±/FN~HüW&/ëÉÐüós _ÆÁ$&×à6¯C)I =nF+ÙlŸä³
RÜKY[*Õl¹Ô·ô#«éoÖKÛ(ý,FÚc{ðmûèÉ";*«èe¶ØiüÝyùûg».íÜŽ»xÄøÆ'øÈ°WEÞ8Þ=¹f÷7ô=Ï
ým-é9õ#ϯ՜~¢$¢,5¿!Ÿ¹)º~åu£ÚøW:Í¿ÖÙ>Aú]ê³uµ/ÖŸZc|îðºÇ÷ë!úë£~VOú5=ã·ôßÓKþL¯¹ÛuºÕ[twü
»ëìg·ÔÓG^ÔÐw?óJöÜkÙKºÞÞÜ4èhôþtž_ÁDüËxœösìåܳ 8
GìÕ`7âõ`øÜâ]¹Š-4åº_óËsâܯ÷ÍÅÞ¶þ&óIÉÜÙmÅ\ëušWüþâ×õ_Ôý÷ÃúïÖ}ŸEwÑCÇøRÖa.ë1u óýÖiëõ%ëö9ë×ul«œ9=JCŒQiüP1z¥üZÙsk9GKx&Íïi5§§Ô·Ù«tìY
wüáKú'ôèîÈìñ¯vMαçGí,=õ)ÙÇ^g?É2;Çß#Som·Í28êE<u&®Z_µZÄ\b¯1XXÌcÓ%€³iÌŠH$OÐþ{ÔpZ0&òúkøcý¡;µ¡=ñÝß5ýäAiò¡05ë]rär%9óù<G>)yõ¯l¿eüAŸý*?É9F^r3ü>³°lŸ¯såM))}$ñIÀ'ûwòÌŸ6>h8=ÐPúAô=åõcMú°&œe£õÖM[mduï¬=Oú6ô6€»µ iAÒµùTÊA kB®6ú©üµÑrh+Ùµ¬Ôv²P;Èlelí"ßi7¥=dö/ŽôÒ~ÒIJ+$êP©§Ã¥ºfÆ !ãÐ hÊ$ÉÍúœÍÚedÝÒ )ÉX³hM\|±^ÿY«]ò§@«~B³N²^gP¬_£ïGÂ36ÉSY#¢ËP°E¬ôV|€ÔÉšØ÷IDz£ÙáRÓ/Ø©>ÌŠ³êuF<Q®OÚ'ÿ\¡h
dÖÅ!|,ŽLÓ*2W+Éb «µŒlÖ2²KK±2¥X¡ârNÊUž¥ïA
äµ|¬h>IiyåMÈmy€ ôäu_Ì1º7fØ©BìØû²ÚÊfØeÅÙÑä³Vn·<o¹gäUVCâx-Iäu%¹7ŽÞH2ù§ÝÉ{ÞΡ]D'ºntœ€÷úþ
4õAÒÚJG-=}¬ôõñò¥Oaþ£|ísä;_ |Ì¥+_DŸÂwÉ:? [üšl÷e/ÝÈa:cTÓt.çéd.ÑÙ\wÓ[t>wèÐ=¢[zF÷ôÅõ ·Æ òk &
JëkAEMT×TA=M4ÑôA+ÍtÒ,A/ÍôÓlÁÍÒ<Á8ÍLÒ|ÁL-,ÔBÁJ}?ØšEZ<8 Çá
.ÃM-üŽlPÙʵLÐ[© =t·Ÿ0Ø£Eïìý`
fc[Ÿ`¥å
6Z`«åöZ65+Ê%žhë>žci:xf)÷×x(Hâ¯)=NðŠÇ
2»Ùüçñ'^Èxq¿ëeü¶Wð^ïx]?ïýŽ7÷ÞÙ÷zOßé_ù*éK|¬Ïóñ>Ógøãßø"áËüK_ã}}gnáíÞ«úAoèGücF©Âhåõ¿èïs÷üºg÷[þwMëzJÿËùßÇÿqõ§þ?q?q?q
?q/qqvá%bðkñKa.b%
&À×:º"h %y]2pìuH¹ñžFá =ç=úÍ[ô×àýæIµàJ°K_xþKíxJíøÚñ7µãŸOÔ?©ø"èKjÏçÔîÔÏzþŽ7Ñ^Oxu=èu/ud;udÔ
þ®®¡,£,¢Ì£Löú=õ,ý÷ÈèçKáé¿KgÿEÚÁý'©KT×ð=RÉ·%é·×5«é³JšÁ¹|6}ötúêIòO$ËŸWý²n4Ù7,J6"+¿ ;ûÉyŽ÷Ú{íÝönA{×¢œKÑÞ¹hî4æ~æ~
ÞöGk{Z#tž5ª:Ü@>¶zhq=ŽžÊQ-®'ÁMÔè2AÂ>m"ÛPªõ°ÕZzÍI(Ù8Žy$ª6mîÂuCé: Í-Pœ&š_T°*º\E,2Öoä=ýN²Sã² Ëéši©šg©eñ©euì_YOÜ_ßQÞ_©_gÐããüœwÛÐãMèñ2ŽxZ<-þQ ÁIt<Z<VÞÔ8Ê¡Üe ZÜ»öTr̲23®MeiÀ4ãÚð]xÚèoEåF
©B¥©@Å)Oå)ËâÉ? "§2Eßge
±BùX©|TðŒrWó ùXÅ\¬fI)-Z
-Îge²±ÙØìLv(;ËÃÎåeóIìF££Ï§Ðæhó5Žù6Úüm~6»Wx^
j]M^G3øÇò¶×Üèrt¹š·2èr%ï@ÔuA{È'Þ[Zz?iï¥;ü¹>-ÿÿÏéhò\_oB·¢Å»d'Ñ»×/ÈYŽø"Z|
¿áÿÈÿWî¡ÅÑâ'ýMþŠC3£¿ÙÑßwÑßèo MC+£¿µ5sÐýmö¶C{»¡œ}ÐÞAhïHt÷tw"º;Ýæ.Go×£µ1hí>8ªåÑá
Á/ðVB+ϵJÒªoZµ 7äu9šjÐåJèr¥N·<N·,º\]..B?f£ÓÑéÕèô&tz'}>FE£¯ Ñ·Ðç»9x>?Gcyê §^Cß@3x +úË=Èç/QÉ'^Ê¢÷PÏ;šè
ÔôªzÑ[ûYïîýsß.oAסÉK|²ÏE'¡Éßù
ÿMæÐæ¹+özG®jéÇü?åõ¥£UBË ÇE¹CÿÃs£Çïø}Ï¿î= zÀ_ž»PQ,xßA¯£ÃÑáShéatu7úÖ®¥hï\K
.§FSÃxâþÐÒÒ±¢éŒ.osìMH¹qžæ¥Š`Gwéoiâàª&ΡÓÇÑéhô4z£TW¡ÊŸ Çù^ç±FB¿Bû£Ï=Ñç.ès;ô¹^ôzÖkë)¯¬ÇŒöºßëNO·zvÝäo¡Íoê
]økhó«:]ê>?±èòh¢v(ºü¥ÿ9>æŸOá£ËÕ|£TðµRÊAÉ€ù.úüß1ŸY-+Yãoq<=ºÊñôh¶û8 àz}ÝÈop Ï|Ý>GñÍG`?úœýÞh=d¬BÃWÂbt|Ú=ú£ßÝÑïÐ
ohxlx¡¡nl"P²Ón&Ç`ä£[ÈvXNÏtºFû£=ÑçèsKò"uQËjšf4:ÚŸ#ÚmÎo ϯ¡ÏBñ]~÷eGÔ[Üßèë/£ÐWàFè @x$<+FDWlDzJ^Èq] qt$Äèw
H®?p§ñžôñÜu}€äaf ?3-böx<Y{ŽOßýþÊ5ÿ<
w~/B»7¡Ý;ÑîýcuÊYôû
þù&:þþùt\ÐàØzèhr:}t.4ºôäu_ÌñQ0
No]hõ~4úßá:}ýýÒªI\Ž:×ÀC,) ¹×ÃG7ÀG7 ¢HÈvçC»{)vC»«¢Û
Ðíf>D:¡Ùœü[^÷©2œïód²¯yŸAûYé;d=QãGdÎcQŸhÿÉÙgü79ãä²ßÇòò»Ç!ëbÃ+ž€×ÈÆ7ÈÊdhzÈB¶æ"sóÅEÉèRdw}=šŠWãk]M4ÖAKtœ¥f
:â«{¢í}ÑöÁr¢ëïcÑ÷ýhùq8§ÑôËp n ëÁ]ø}¯N×F£Cstº=tG«ûFzý>>º:ýn°Írâ¡sáß~±LšYfT-cð§¥EáÒá¡Cýª*øOÄw€' z ÇÅSÇÒ{ìà-· »ÿëÙü¹¿bF=+úMôûºÑñË¡°PØ'OÞ§øòDÔįnÜã©%îsß?PÈ_ÏjÇÏÌ1z²yoÔÉô}šA}¡Ž£&µfÐgnµ ëPÙŸ#ì?Â>$ìGŸ$ìOÂ>¥8}Lú\ÁhÂ>ôc?zQo;±?¡5žŠ>úìau»¢&*AM×W/È£±¬ªA&}Û}âÉ©óôÇÓÛîzÃÉ5ž%§üñórùiÙíÇd«MŸ[Ö ¬Ë`9®wê:5?ø\rÑšçW>?2Aú×Òºû0ŒÊ0éàäSï+õŒ»TöÎò¡·ÞZ
zsy\ÉKÍã@#Iã
¡$óÚ<K?íUå9ø^öòñ/òòŠ}(ÉÓËx«}Vá€Gœ0@fáÁŠBØ/$ÏAØC÷!ï{@ØWä}nxsRB®SŽàs¯x®¢9玧?Ѐ]ú¡ìF6ã3ã7çjU§uä{<è/ß eßhC7Ÿ
ÐÆ2Pâ°[â°[JWmËnwÆÚW*é)£¥žBúµäÕq
ϧÓ8ì¹õ»kEu3
Ÿ]Ên¹+åërQÎÊ59Å»#ÑwãÏ9ËuÊŒLÒê"É€ó$+µ.㮯ã®Z×àÎõA=TûS&Q+jK'zÏŽ¿ô¢Þ|ÑÏeŽöÄe÷Â]wÁ]wÂU·aeÚ°BšapÕ-äwÔý%Ä>/úTCÙè3€fÒQ;D/µnÐÏÚ°KágOíرv²Þhµu
u
öl£îî£wú:üõé§~¡>ÿbåW&ØH!FƧïߣÔ?J:T6-dDi3A6ŒAXÿÿçBšéWœ_ð~Ò»ø>ïå»|š¯öQŸÔÇù|:íYtÜßãîÆúbÜÞräkœïðvÝÌz®¬êgP^O÷_ÂAþâE9ÿæ9üwzí;šÍ^;%þ.j;>OQ%CÁÐsßÂç]³ŸÛQžôÞñqŽñéœ_A}ãïãïáíÑs§ çNCN
¿K|ÀëPÒs<Œÿûy¿ÂcªÁM<ÝUžç©'pÿ©éÁwR9¶PEè#CE¿Juù^À]£Á>\ïÀï>PóÞzÕ»é5žìíõ·Ô3ÞXOz]=êÕôWÐ}^Rwx(ª=®õ·u9j¹gÔù(ÔÔiÇ×(Ô8º<'t9à>óéGÓ
nŠU±ø¿ÊCµÝ²¬¥ú®÷ØãÐß
¿áœÇ§±÷éÍ' .qTõ¡T÷!òîãñn[W±«powØ; ñu;ñu[èÏ×KÓe0ø=éÅ;BKzñÆð1œx9(aµq#µñyao^³fØ×ÃïÕÃï
=z9[£œ¬äÌšOo!3àòj,p®ésò+p{r¯9Nª1ùX
-ÃúŒý?ê1z¢€Ñiäý4ºê8µ¹hÁR1x*«QÕtáéÆw ;p{{p~Çå4åÕ.Ÿ³bððKð~ä%ŒY4Uâá÷C"ý
VánÃQ!Ì`ŒbäÆ©b¶Åq¯eQJ<I-¢>OÙ§mÍÓwf5zàýúi
Ô¥
N·|Kï>
æ.@WàõöãõàõNÓ¯_°oÿMs°Â9¢=6œyBûöôëé ìÝsYü_v*+®<+ý{¶ša/ß÷= ìïò>7Œ_L ðqà%÷œ5ä=ÏP#R0¿ZZVi9üjyvªXIŠhEJmøg¥ÕQÌÚøÛzÏíOmèIMè]©m© ͵-ž£|¬]ÙÑRýÕ}_¿dGI
££@=B=.¯°£±©J]xÆNÞEíoÉ^jÁ jÁYjÁuÙ/·ÙÅ{²Z°Nbé
Is]çÈ:>Q'Kvv1äù¿O=(¥¥òÔrÄUUvõªTKªUb®»Úøë®I_íNeëÁ®uqìð$âtÕm&q»0ú@KÙÀS®gÇ·ÁQvý\Š:Þ¿'ú,«u¢u"ü|«ÔFÑg^€t>kÂn5¡º9ØFæXkYBn®!G7«;šÈÛÔãôiçÈçsö9N¡?®a ÀAÆIÃQžñW'ÞY!9}®~ŒÛyס#Ëè)×H1ú8õŸ~s;}ç^i[oqPütÏý6nè.®è®Ái
ÇqÁÇ©ÿSã©èu3ë*ÏŠë</}pqÝíeè+Ñ× O®O¿ü }skúçÐA/ywôµîm|î ×?ÿéÁ§¡ÓsÑìe°
¡Oß
BÛOÁIzøð³Öð3×[ÔðsØ°&ÍÑÕÙݶŒï_ÁÎ
`<µh,
%Ôš-;Ø áµë8uìœð«ö¯ßŽÇþØþv¡îÅö?=!u0
ßò4~Ã3û5\û%Ïëçqígœòr~Ì+ûa¯í»ýSøÄ·zkhã«Œ|îK|/ðá0êüµÿèãá;ÿÖ§ûÃE>ØWxwßî= #£4eÔfð1w©ÆÃÞ ¬ÿ?G¿uKC]È&Èÿi0»ññ?Ã)üáEzÅkôÏð÷òâ{%I
IŒŒN¯2à_߬^ª+¹éâuá{?2xàÊÞ*Ö>±~ùüóéãÃÑDÍ·DÍ÷ôSégÈÌ<_B¯ž>q}âÙåûé÷Á99ç7ä*=âU*åMÿ[þ$òþ€?|JÔ=õDA"HN€e÷3±óÙè h*ú7 MPŸ¢,=a%zÂZô
é?êÛAsÍ9¶ô%mé »jÞàK-ùZ8£E h°p=à>اµRð\ëZ
Þ§
=bà_€ŽjA
Hg5ÜP×å ªU¡gªBïX WS)èO?9V[QúÆž üDZ"-_pÌòiïi9³ôcW,Gð;ýä-Ëܵ,Á_öVðØ2/è)ÓÃÅò4AzÈþJðýc~ ýbi\XU"³ñÐÈ%N~!ÚÎ;?qð1øÁõxÁ¥>Åçá
'ãÇûJ¢m-ѶOž3÷y'®hEL5àêRÿW8/JŒ`ôøÀ<xÀwü.qÿ·gàίãSÓ&e&Ið ü¿ÂÌ®ö¹ôø9vÜMNÆàíÖÃR:ä 0'ë-éPCq^
ãéàMHL'ø ÿÐ=þ©ÉðI+hÂ
:Æø¿DÉ,tc2ã·DηøÀx¿!x¿~èL?|_ô§3Ÿ¯þVóZú3ÚuÜËêOhÙ/š»ü]È«ÛÐžÍ ¿ÒéROßK 3ñyÓü%åcºÉûð@Ÿ&ráñùUéå?ãõKßÆî:øŒêŸí]-¥})4ùùÐ×çF³CÝÎÏûŸB>òŸN>ªŸIª@-4»m3²Š)tôSdÜY:Ö³hõuŽú6ó®1dÏxt{²þHÍ!y24;œnð,ºÅsèvϧ{ý}=èè/¯'ŒöõŒ7D«Û£Ó]Y§^ÐîÏÚ
EGÃ(<õw¬íTNÏfœÃÏT±þ«`¥&Ä'F£wÙ£ðsÙðóÙ8ì_øymø¹møùmø9nøynchÄûÐúqÎPã%°Ö¡Ý[,!Y Ñ£ÑOÑh£O,&F£SéÑè¬ô-¹ 'J.FWôÓ^ÝOÐ1€c:èÍQÖöÐÁ·xoßàaý/óÑ0
"ÿù{6œY>oòÏ|/Wíõ®Ô[Á'Ü¥Ÿ_!®P®{-šä·É€ÛtWŒR^îïÁÛ+HïñÔþjxø9Qj2%]ð§enZæà2:pƲGÑ'Øýì¶@°Ê
¼R*C
+ÖA#«ÀjVª@Yô§\hRîèçáÏ+Â[?¿þ<#ü¹Fš{áÏ:ÊëµTð
F¢£`zÙ
íìí£dZ -¡fjkÆàcšþÓÔA ²³ &
A}5xKãoj¬ %DÓ)=òGr(œî·ä_Ó~PvÙÛ}lÍŸYÖørYí³eüèÓɶIdÚ$ùNh#_ÁP%_ø0ùÌ¿®ÐÍûÓauzÞÓ§Ó¬kEÖ5"Þk ¹ŒN©.|kª
Õ%5/WÄ^QâRãz:òàCyJœ|jÐaÔÐVPQSYÙáÏͶàµç@ø3µ©øïñþmtä×Ãúü¿ÿçójô»jwå1±{_ñ'Ÿâ&Ÿâ:ú3=öQ|ÅAôu7Z»
|
Q³ø¿áåPîèzUÿxîE€uBý[שµŒ 1×ÄKá?Þ§ä!ÖÓ@R"ô¡µòÛFìÃvkæëìS_lM|&LŽ>ÊêùVÇ?³ÚÞÞª{S«ê[E¯h匀öV³[Ï`
<¹åõË_j6šýwMç5Ô€~@_ñmÛW« mºÞ· ú»Ô«6H/Xo=iôµÐÝÖH·XM]guÔyVX§Z6mu¥Ñ>L»YBmg±µÖ·§RÃîKûC>°ôGWé.HfûYÒØqIf?I|Û/f{å±n§{ÝJÿ³I.ê:9¥kä ®ºg¿ÞlÌ£«øÆë<zy2£/Ôçu
šÀ±RPsóp]V:ôñ:c%Ñ
@·ÐSn§Ù-èZîÈa¹A/s-êi¶ÐÁl'²^g
ÄáúDñÒ1vîKgI:âú#]ËRþŽ)ôåõ`ͱñð#çÍã\»1v2ÿÃy¹\âÙnñ÷xÖ§º3zöWì0œäQzÉÕÎI»,ïÛoRu«Äú}Ì:6f=[Y\íÄúöbZfk9t²œ§³¬.²ÊºÉêèNk¢·nzÎú±CõŠ}£Ùöv®Ÿ°åìõfö|{\SûMï7{ÄÆsÍãq¬¿f
ýMâçâ(?ñT"«ª^Ëjú'Ä\[b¯§5"þ-ËÄg+âŽ
ñÚÎÃiëàWà¶uòdD~:ô;+äõv8v^÷S
X¯KÌ7
¶äA7ò¡¹1M®ÇßL%æGKȧ5žšMä×N|ü~ŒÎQ²æyxZrŒü3ò7±ý
¿°0o3ZÃŽ+©«ï¡ì£Bÿ¢ÿÇÉÁÃ|úòðRô+ù©¹qSïàŠ2E¿œr×Sú=OD]
?E{fü=ñ;ö̯Ûs¿d/yÞ~Ì4úÈí°ÙbÓ`Å :G¿ý+šr¬çå\ó€eä1ã0öËP{qCwõßÀ]Â
ÕÛìÙ-röºï òoÖ+äí/ŸX/PÙÏÐýìpG_ãé! ûü3ÜQWÜQ[ÜQs]ïtµ×Ñå^UûG8€:Ûàòë$Ï©ümçt¿¡Ãü5ýÒ_ÕþxûÞtÝp)p+mPÄÔ&þ+Úý}Å9úRÎB»÷¡Ý;ÐîÒFyÚ
ºð
Ýol(âßÉcûZîÓÿa_Éoö¥üB÷|.úž}uÖ»èŽcèº×Y;YadµYö)ÝÍn cèâZhµ¥·ÕnV]ÚYUºøÊtô¥®}$Õ¬úS\úPZi4š4T<+)I¹WB®iI4§€ì×"rDË ž¡Ñ£ò/¯Í
K*+B~VLòAQ®+Å cÖeüFܧ÷lÇœ»1>Ìe óÎüÆ0ÏpÎSQô¬YôL¬Mô{xÖC<óI=ü$áª
¬É¬Í?6JþµošoßQë&Q÷ŠI
)i|>œßRz¿8Òµòkÿ¡¢þóŒíSö,Ü»pÃœæÉ£œ
÷8Üë)[§³÷³œ.ôÒžæºÒ«ã ëèFo¬1ÞRwà0÷xwÜv_âj0ñ58GŒM$îŠóÃåÄäzh1ºXý=Eì^Ô~XŸËšÏÐçxO@ì¿FŒA>dìäÇ{/(¥-AP
êÚ«AkèlÈ£DÁl^¯Í;Ç8÷,×]âúpñ2îsÆwçx·$t<)É×7ÉÛ·Èßìäñ{äs!òº8ùþVD\g
r¿.Tc:ªæèAk?I?ÔCÝHý.ìP/(LžðLÄLŠI*.i œÌÌ2[²Ê\É!ó%Œ'¥ ,²TJ@IY.åd¥TÕRYÖJMY/ud£4ÍÒDb€lVÐNv!Ýdô>rHŸdã2RNÊùYŸÓòœeFçÉEfp
»_á®×¹Û
îr»Üæwý.£>`Ôr@1ÒFzÆ(/åï*äUªßM§È«ú'UðoªçcyMÿ¥Ÿ7Ô5ÆÑ@3i"}Kë;úºf绹ùî»|'?ß)È»ü]RèŒ*§¥µªVÔêü©Í:ZOëk#m¬hSmζÚSûjçþÀx!ýõMH˱7 æN#žÿ×ú¶~ÇÝ&iNÎçê{º».׺VéfîŒ;ïfõ#=Šõ4ó8¯5õ
ãßкz[ê=fñ9<ÓªÖVcYGM`5}Š¯[_}Óh&¬ïØWÃFh^ûZØ8-jŽMÓ
øŠ*6_?¶ÅÚÐVks[¯mmv·CÚ×~Ò/íõúþ`ðMt=ÇC©°X¶ÎâÙ{Õ¶Øk¶ÝÞŽÃö³wìåŽÓö®·vÉØ5+i×í#»cUíÕŽVÏþ±öÔ>±¥ uÙŒ³Åöî_ø÷·Ä>Øù0Ká#,eišÙi|¥ãX:ÿÜ2RÇ3r~fï
ë³xGËÊX!ÙŒ%4·øËÔþ\ÞZ¯µñ5¡ºåóªPïP>ÄsxßA+(êïYqrÛxüm+
?-
×(Cý+ã¯[YO¬<úPÞãYwP«nTâk5Ž£Ç>æzïßßñ~#;>#·uã^=Œ°õÆ·ôóÒö
dÛæ:yfþcyoy¶ïyÆx橬ÃÖck3uZÄz-ñol
O°U>ÅÖùtÛàsm3'ÆWÚ_o{<Æöù;äûì'ÿÉúI;éçìgŒÀ9<Á|Ï/øËø_ýýæ/íwEÇ8¥ÿ.=Æc<ÅküëïºÝb¥=vðǪú+AO4ò€ASOŽöAgOôô4A_OöôÁÏ|ãoýí`¿ÌõìÁbϬöwþ^°ÃóûŒ`pÔ?{à®yÉà¶îùÁ/hðQ'š$
*ɪAÚ fÒÕ×yï'áø«/(àbžŠtðq1ÞC/<`ü»p{ÝàŸ×žÿeÏÍýrgÓIæv9b®ûóÏÀÜÒ1<ÇFg-ϵþz)ϹçïÙ<ûtÖ`
k1Ñãß±.ß°>_³V#à+ÖíKÖ¯?ëØ×ÿñ¬iWÿíþ?ù^ïwŒåMüÞožÊðg°éÂ~ÁU^ÀUÃUÁUÄU§ï?êÅÐûÂøÃü~:±žœÙFíñŸýÚàoø:ön¿æ«üU\i<pºŸ6_8ÃÙôoSýM&Æû
bí:1wÅÆøEâïqxÆ/Cü8±ù3±| Ç¿àŒ/ü±{nXÆèCõfŒÞÄR/ÆéÁœzøsâ]qÍî]. ¢sëgmÇ<ÛyrŒvJx¿ý€ÅogLôoÁÛxïw"xNÈÍjœïyÖ"€ëRî¶kô1kRu©áETc=CªxešJw[jã®ëDe²¬}âüž¶(ãœÏØžW>î9äb^9XëlÌ7óÏȳ€gÓñ©yæTäS
Ö"©ßEãn¡u×-.y54Öó?ÿÈ!Žq¹Ãþ¶4sœÝµvÛÚ-[ÎFS§¡ì¢M°³ö
z;ÂNØvÐúÛ~ûÌv[wÛim«µG[¢ÓMÑëƶ
í]fµmU·VÑæX9e%l²¶ï-¿G·ÇZvûÚ2ÙWhú`{ÝÕÄ0bëlΚϩ·š×Ž×JvFËS/Ú-d1Çj[ši©/¯Ñ·œf+©Gà'MdáŸjwà.µê<×xj;€
7©.oÃ;Ü0¡âí¥Vê\ÑsuKhmOÑmjùþ]ÍìªÚu-ÇJ2ÃÂvZsÚA}ËöRwPcÕzT_ê|}¢³õNÔëÔåKÔçs:LOR¯÷égTâî£Úš+©¶sñÓñšÈßá
Ÿ¡R b7ÇOÔ×W9zÔí§_wõ²d×sò¶Lúý®èÿÿŠ8ºï23?3o3ó-g4Þg(>h š\x¥.xŠvø§rÏuHêá¯jÊ.üØ6ŒÙf)[*k*OËÊËK³JÍBÏ»Äü`èÿ÷¯u
ÿ×ÿþµ®@jE ÍçÄÖsâì¥MiŠÔ¥göÙ+bŸÅÔW#Z"HâË-9€€îŒoøj˱»úºZ²²¹Üª0F_HÍ\hµ·õëcîS7bŠÕgõ©m
}ÐúûŽLÄ\ݱOçEÐ9tVÄ|tn!¬DëVÃzô.d3Ûš«;`56d:žö£
!ÑÂ#há é§ÐÃÓ6,â¬
F¿þhaßkö9ôD»GܲÎÐüo
-ÑÆO 1Ðꣿ£5
ZQ * e úò¢×ñ ¯±;øû^Ä<ÖtâñxhWàë"çSp59qÇpöa8²ìœvíž»v\A?®Ø&FÙÄ(ë#ÎÛjgeÄ)[qÂ3ÚbFÏhómnÄ^Ôjì²èÙLÛFmµDÔjXNt
,Ž\5ÑèwûtpÄ\Mâ!ûT#ès`alþï_ëÅëzùø=þ=þO<g¯¿e¯¿eÇúFØÌÆ°[a'û²}ÙKM;GØÇc6ú³ßýÙ럧ÙÓÓöûÝ3â<ûz}œd¡-ûݲߡ!û]êRkA
jbšÄþž·ŒÏ|ÀÞ>À>$²Çȹ<ç=þŸÇ»ÑÛìÛ-žÁ«kp
w#nPn°×ØÛkìÄ%vâ;p==Ïf?CNQUBN°ÇlcÄö5ä0{ºv³+!;©:!ÛÙÛÃNmìíZXÎÞ,doçñK§EìÐ)ÛtRD~±\ãxH>³mú(b>Ø£"ŠÁÓ`:=æá!YÅèÐJ4(d5k¶ýYþlDB6£AÑ {3b+ºCN
lfýC6gÙõèÎzöh-{²|\É>.
äjÈ|ö6d¶5Î~OätÈm±KGìЊÛô±\WEÄèmúcıK'GÐ"&Ùÿô¹Pôï2ŠôzÄÒë)ËqÚ
E<²©rÚVE²5Çl]Ä!]q@WEìÓ©sµìÓ4}Äÿ?ÏÚG÷ÍGõ:fɹgʳ*⌥žhi".1·++âÍ+Ì%ämžh`³qʶEûï×ÔË]º%bnØŠ"bt^ÄrÍ¥!1&bŠØ¡©"viÊôÿ!§,|ÿëWÑóäIGö¶§p6!ÇèCnéäÛ:6âž«C"îé :úÑ÷x¢œéÚ{ã=zEžõgÝð%Ýô
«1W»YÈV#"UÃUÃU ¿ÄUÂýT ?/eéÕËDÜÓRðšhÄzÿÛ#âw9ë
9eé"N[øüÿÛó¹ÑTöÌ«=.®qÄrmc!I¬QDkñRëE<Ó:pcáÖž{»;»Ëo3ç[Ì9äó
¹Î|¯kqû/ù+sœª¹ ]æ®!§íµóR¢z)Ñž4W,sÄ¥!WlQÄ%<^ÈEf|ÏwÎÚêS¶6â²N
Éz=ùUÃPüàìß
ýœîœÙãÏØßìm÷ÚUÂ#íñ¿ø^j{UÖ-
ëçÑ¿úÿ1šê<Ddïèèð<²
ð
CðA¿ÿð2ðZ<F÷~n=%k÷41ÿ6<.=`!ð.<F÷~n=%k÷416VÿÿÿÿY =8¬ü;þx]Œže¶œbh¥€D@JDZ$¥$€Sî€EP)éîÎM7HKKÀÎŒïûÇ÷Éq²gÏÌ=÷Ü÷Z׺ֳ·šÄñ7²Ä±ÿp+áWìË ~ŸJ`/ùïU^eHIé®->íÞ©ëûé+«[§rYIõß#Y€t§?íÞŠiûé{µéÞ:}çnͺ¶éÜ=G¥6;uïÚ©cféß{/OxSî¢áØÑ}}5úK5ú¯qùúÔ$úïçåT8|ý×ô?þû]ý¿F1Þ'äkfõß³úµÿŒûÏȱþí¿#Ëÿ5²ËÿfÜTÃÉ2YÊßÕ}
|
}äô5 Rú:IàDáÛ*¿Ûv¹l;ågÛ+l¿l³Ã²ÚÉB;%Óí|gd]ö«ô²ÒÁþfö·Ô±ÇRÕ^ÈfZÄâê»P߶dÖÒhrËš¯XV
,>Õüz_èïZZ/kE=£ÕõšöÖù:H§ëH¬ãô[«Ù:Dj?]¯œtvÑÚNOjýEèM§÷ŽŠ>ÓÊË>ÒDVZ_·búÖÜ_Û»ú¡e×*ܵŸeÖæ^;3ŸJ¿²:Îê4fžÀ^ÑU_·2ãèif
îè3&¶ÿ+Iý©dþXÂh^õûŒŸ/=ü/)
xúß\ó·<³ä.+rÍÊi8ÈX[scÏã>Sžß8î;9|nµ#+Õ¹Õekiæ\вiNË©xVP_µ"êVRi9œÃÊýÊÊÓ:¬^#Ý£Í4õYÍ:-dœŠ³nY¿1:Z²_°®=tŠvàh]ÎõC=®%¡ #åÑ?4þ£õ
ŠÑž¬Pbfö:³Ìij3ûü<M »/±ß5Ù÷FvUZÙ/ÒÅÎI?bc(1ò)vPæ;Ë¡ÍÄÓÛ"Çmübë䊿mŒ°xLîKäM_$Ù¡ /ÒPÙçIÉëéÆí(cdæŸiún°P³«õ F3û5mpBS5IpC÷4VðäeO=ýí)íOÏ`7=»]öŒvÎÚq/cŒmöƶÖ[Úbïhsœ¿MðÁ6ÚGÙÿÖúùÖÃgX;gÍ|Õó5VÝ7Y9ßn%|¯å÷ÃÝOXF?m©ü¢%ôkø
{j·í/»g¿ÙC»`Oìšýk{L|GWX\FïS9{¬%ö¡ÔûX
ïÄ-,µ7°4^ÍÒ1»t^ÈÒ{.FÏbýoÍìÇ4£ï
eÞgÁ÷ÎGjš©œ§Šò¶Âk2¯¡Iœ¬&ô¢úçÑøYc{*5U_ 3Oí<²ÛòÀ.£'ä6Y~]ºÄηyrÊŠÈ1GÌ~%;/qÛYö[WÞÆ÷¿$GÉE(Wl¶Ü°%\¿AîÙnyH<±óšÑ
1 ¿ø9M9å`~
gæ\¹7äZó<Ýy¶~ÅkVK4ocÃ/Âߌ~),+ëuÉÂúdf2²^Y·t¬_:ïÂöa-²ŠcYÛp°Þ«X÷pý÷±ÇÙöÈnÚ»owywÛbûuvãWeÔSÓXAßo%}§UdÏk²÷ì^'b¢7±1ÐÇÙpbå[bf¢÷µÞÐvx
Ûç¥ì³ûÅóØoþ¶ýái퟿F,&0ÄÞbÑ;Äê5bö4±{X3»ôí`#1œØMÏÔQ¬1ßÙÃø_Ë:mGc¶Jjß"©PëõN Qòø«ÐU¬ÿ2ö!d<¿mÜ¿Øß[pÃæ°çsЧYìå,ö}û>ýý}þý*[`MY0×ßÃx
Ñ;ŸâÚÁð%c
þý9tåÞ¡#1ÕÚùmQÖ€9ñÖuhJµiR|Bü|j4&G
Ë(MãÇ{
/8WŽ)Ô<"®¶DC[¢áQ«Öèh[tœ-ZÚkßÙÒiW4µ+Uš;ºÚ3"º
rèËùÐâBÔB:ÌÞ×V\ÇXß[š€?XjU¡ºþs¬Z^GY=h ˬ®h¢kìS]gÍtl±VÔVºÓÚénØoš5ôuÑcpºQwBzèyë¥àõÖë}ôõ£õÓ¿ìœÿØ@}Omù<HÅh\ïCɳ¡äÿpòj8ñ2Rß®e¡<Ç*AÎ µ}Öš
¡MàSr±Žò>Ð[ÛDôÒÐÉ»i7ïŽGD;íÑF{{+h¡}Œ4Ñ~Þè^jê@¯Eyý>äãX^ÈÁ¹Ù 3×dd¬ô±Ó@jî
iO
Ç+_Ûy\Íü
4£&
MšÏMü©íHM¿)UüªTòËRJùùÀOKq?%E¡|Ã÷Rß÷cÛå?9¶ÛK~ídï%äÞ+Œ
o Ï6PÍÖgëpgkpPÿ©p÷á/ªÜ]žCÜëäáždȹEäÜŽty7OöÂnòg¬!æÀ,^ÿßsl4âÜ0kG,!ïwËÈ»Ò>çÞE¬ÐêÛ|ë±<Ü {ÉÃÒ2âùxþâõ}øcá)çþF>| ɧÄJ)È©TúYD:ò*ö'ßúkȵø°/É·Á9tù6Ú
_ïë·äÚxL®M(«³È·90[@Î-"ßÀ*òm
l ß6Áòm+ì&ÏöÃaòìXD=E®³äÚyžhÈNäVòªÞ çnÃòî.üEÞý
ÿwOá_rï¹ð
$$7A
r%3d%w
@!^2«8·fDÑëMõ"Çzc=ȱnÄnHò1ÝZëBb?€¹P* ¯KAå<²Y 39Ò3V:HC€Täp
HFN'
ÄÜ3!÷qKHlæ(ðBêá{ëOu &ùTO[ªáq«àw«øRü*¥üWžJn]&·.ã
Ï[çÈ3|ËC®å¬äZf?L$ÇöGyæ[üšŸ
Ò€Á}}%ø~ÓøÁïp_ãá
ÆĶ o$€TÓöÂSA:û×ÓSa3ÛcÏjÿx6\_.ªn^ûËóáþ
R
Ûï^Ì®úžÀšÐÕí׎^Çx=;Øïl·jÛœmÅOlòV¶ÁÛØog+Œ-Á§-ÀcÌñn6Ã{ØTïe?Àxïmcñ£œ îñÜÁÖÇZ/è欱ŠÐoRªøp<Êp<ÊPŒÉP3ýcCp$ìܲv
.ÚvÚúÙ 8l}l¯õ¶°ÅzÙ:ëa+¬-±.6fX'jì{kgcŽ6Ú§\ÝÄ>³FÖÕX{«c¶5µÖت[]«l5¬¢U±rVÞ>Ž2VÒ[ +dE,¶<ß²Y^ËÌ«ôÃÒð.
e±€Ñ^±tïIJTöRÙ#úŒ{ôwèõn©ÙiýKOèz~o¿^ÕtoÛéùè.]DÇ2K×ê]©Séô&Ó|O×7îe,à7t0£èGè×:¿ëWú¥àO_íOÇØæsí€Ñ÷ôÔVÚš+MgzÃZ[ÛÓµ¥OjK¿Ôn³¥ÂÚŽ¹Ÿ«M5'dÒOôMH©5 ÜOô\¢w>'€¹¢zXZê^Ø-uŽÕØ(íutÔÕÒYKW],ÝuŸôÔ¹òÎÏuºôÕ)Ò_'Ê _ê8¡#d¬ñÚ_Ÿ×Ÿ2Y?YÚUæigY€e¶ÚVÖhkY§-e¯§òý8þ=ç}«Ýåýñ1î(î3ûMàŸžÿæ1ùÌfnsa!s]ÊW2ÿÕ°çÙ̳mƺöJC=G€>ÏY_OK]¹®^YYº2h}}ÞÑÞc
B1Ö$|È:VdM«BMÖžëÝuÿ=hÁ^ŽcO:±7ÝØ£ÞìW_ö-ÜůØÇŒúœýwy7
=Éwæ
åÄÄjâdΡË]AϺøY§t^Öô®±SúXÏÒ»^T±ëÄßmâðŠ²çÆšMôÆ'f»©åtDvf+hYñ\Vï$ÞK÷嬹PšDnÔ Gê/ùÒŒiDþ|J5#ZWmÈÖväYMþ}K~ONN%7g£ÈÕeäí*ÎÜ[ÉçdäA®:BŸó\} ®ÛpzèÀHºÈÑô*£éLÆ cèÇ¢cÑ1Ör¬tòt##éV£9Cm(DKÆÀ·èÎ÷èÏdŽhº4æ¡SKЬ°
[mBÓ¶¢m;ѹœ°Ý;þCO£çÐÆèäe¯M]ýM-¶FcK¢µÅÐÜÂhoA48ZMÎ>gC§³ ÙÑnt"H
©,~Ì^ Ã+0%þ¥<êÀÉšç¿)?Ë 9.ä«rZnòþ/9*ÿÈ!y!û$îWçääcZòñ-b<'±/FN~HüW&/ëÉÐüós _ÆÁ$&×à6¯C)I =nF+ÙlŸä³
RÜKY[*Õl¹Ô·ô#«éoÖKÛ(ý,FÚc{ðmûèÉ";*«èe¶ØiüÝyùûg».íÜŽ»xÄøÆ'øÈ°WEÞ8Þ=¹f÷7ô=Ï
ým-é9õ#ϯ՜~¢$¢,5¿!Ÿ¹)º~åu£ÚøW:Í¿ÖÙ>Aú]ê³uµ/ÖŸZc|îðºÇ÷ë!úë£~VOú5=ã·ôßÓKþL¯¹ÛuºÕ[twü
»ëìg·ÔÓG^ÔÐw?óJöÜkÙKºÞÞÜ4èhôþtž_ÁDüËxœösìåܳ 8
GìÕ`7âõ`øÜâ]¹Š-4åº_óËsâܯ÷ÍÅÞ¶þ&óIÉÜÙmÅ\ëušWüþâ×õ_Ôý÷ÃúïÖ}ŸEwÑCÇøRÖa.ë1u óýÖiëõ%ëö9ë×ul«œ9=JCŒQiüP1z¥üZÙsk9GKx&Íïi5§§Ô·Ù«tìY
wüáKú'ôèîÈìñ¯vMαçGí,=õ)ÙÇ^g?É2;Çß#Som·Í28êE<u&®Z_µZÄ\b¯1XXÌcÓ%€³iÌŠH$OÐþ{ÔpZ0&òúkøcý¡;µ¡=ñÝß5ýäAiò¡05ë]rär%9óù<G>)yõ¯l¿eüAŸý*?É9F^r3ü>³°lŸ¯såM))}$ñIÀ'ûwòÌŸ6>h8=ÐPúAô=åõcMú°&œe£õÖM[mduï¬=Oú6ô6€»µ iAÒµùTÊA kB®6ú©üµÑrh+Ùµ¬Ôv²P;Èlelí"ßi7¥=dö/ŽôÒ~ÒIJ+$êP©§Ã¥ºfÆ !ãÐ hÊ$ÉÍúœÍÚedÝÒ )ÉX³hM\|±^ÿY«]ò§@«~B³N²^gP¬_£ïGÂ36ÉSY#¢ËP°E¬ôV|€ÔÉšØ÷IDz£ÙáRÓ/Ø©>ÌŠ³êuF<Q®OÚ'ÿ\¡h
dÖÅ!|,ŽLÓ*2W+Éb «µŒlÖ2²KK±2¥X¡ârNÊUž¥ïA
äµ|¬h>IiyåMÈmy€ ôäu_Ì1º7fØ©BìØû²ÚÊfØeÅÙÑä³Vn·<o¹gäUVCâx-Iäu%¹7ŽÞH2ù§ÝÉ{ÞΡ]D'ºntœ€÷úþ
4õAÒÚJG-=}¬ôõñò¥Oaþ£|ísä;_ |Ì¥+_DŸÂwÉ:? [üšl÷e/ÝÈa:cTÓt.çéd.ÑÙ\wÓ[t>wèÐ=¢[zF÷ôÅõ ·Æ òk &
JëkAEMT×TA=M4ÑôA+ÍtÒ,A/ÍôÓlÁÍÒ<Á8ÍLÒ|ÁL-,ÔBÁJ}?ØšEZ<8 Çá
.ÃM-üŽlPÙʵLÐ[© =t·Ÿ0Ø£Eïìý`
fc[Ÿ`¥å
6Z`«åöZ65+Ê%žhë>žci:xf)÷×x(Hâ¯)=NðŠÇ
2»Ùüçñ'^Èxq¿ëeü¶Wð^ïx]?ïýŽ7÷ÞÙ÷zOßé_ù*éK|¬Ïóñ>Ógøãßø"áËüK_ã}}gnáíÞ«úAoèGücF©Âhåõ¿èïs÷üºg÷[þwMëzJÿËùßÇÿqõ§þ?q?q?q
?q/qqvá%bðkñKa.b%
&À×:º"h %y]2pìuH¹ñžFá =ç=úÍ[ô×àýæIµàJ°K_xþKíxJíøÚñ7µãŸOÔ?©ø"èKjÏçÔîÔÏzþŽ7Ñ^Oxu=èu/ud;udÔ
þ®®¡,£,¢Ì£Löú=õ,ý÷ÈèçKáé¿KgÿEÚÁý'©KT×ð=RÉ·%é·×5«é³JšÁ¹|6}ötúêIòO$ËŸWý²n4Ù7,J6"+¿ ;ûÉyŽ÷Ú{íÝönA{×¢œKÑÞ¹hî4æ~æ~
ÞöGk{Z#tž5ª:Ü@>¶zhq=ŽžÊQ-®'ÁMÔè2AÂ>m"ÛPªõ°ÕZzÍI(Ù8Žy$ª6mîÂuCé: Í-Pœ&š_T°*º\E,2Öoä=ýN²Sã² Ëéši©šg©eñ©euì_YOÜ_ßQÞ_©_gÐããüœwÛÐãMèñ2ŽxZ<-þQ ÁIt<Z<VÞÔ8Ê¡Üe ZÜ»öTr̲23®MeiÀ4ãÚð]xÚèoEåF
©B¥©@Å)Oå)ËâÉ? "§2Eßge
±BùX©|TðŒrWó ùXÅ\¬fI)-Z
-Îge²±ÙØìLv(;ËÃÎåeóIìF££Ï§Ðæhó5Žù6Úüm~6»Wx^
j]M^G3øÇò¶×Üèrt¹š·2èr%ï@ÔuA{È'Þ[Zz?iï¥;ü¹>-ÿÿÏéhò\_oB·¢Å»d'Ñ»×/ÈYŽø"Z|
¿áÿÈÿWî¡ÅÑâ'ýMþŠC3£¿ÙÑßwÑßèo MC+£¿µ5sÐýmö¶C{»¡œ}ÐÞAhïHt÷tw"º;Ýæ.Go×£µ1hí>8ªåÑá
Á/ðVB+ϵJÒªoZµ 7äu9šjÐåJèr¥N·<N·,º\]..B?f£ÓÑéÕèô&tz'}>FE£¯ Ñ·Ðç»9x>?Gcyê §^Cß@3x +úË=Èç/QÉ'^Ê¢÷PÏ;šè
ÔôªzÑ[ûYïîýsß.oAסÉK|²ÏE'¡Éßù
ÿMæÐæ¹+özG®jéÇü?åõ¥£UBË ÇE¹CÿÃs£Çïø}Ï¿î= zÀ_ž»PQ,xßA¯£ÃÑáShéatu7úÖ®¥hï\K
.§FSÃxâþÐÒÒ±¢éŒ.osìMH¹qžæ¥Š`Gwéoiâàª&ΡÓÇÑéhô4z£TW¡ÊŸ Çù^ç±FB¿Bû£Ï=Ñç.ès;ô¹^ôzÖkë)¯¬ÇŒöºßëNO·zvÝäo¡Íoê
]økhó«:]ê>?±èòh¢v(ºü¥ÿ9>æŸOá£ËÕ|£TðµRÊAÉ€ù.úüß1ŸY-+Yãoq<=ºÊñôh¶û8 àz}ÝÈop Ï|Ý>GñÍG`?úœýÞh=d¬BÃWÂbt|Ú=ú£ßÝÑïÐ
ohxlx¡¡nl"P²Ón&Ç`ä£[ÈvXNÏtºFû£=ÑçèsKò"uQËjšf4:ÚŸ#ÚmÎo ϯ¡ÏBñ]~÷eGÔ[Üßèë/£ÐWàFè @x$<+FDWlDzJ^Èq] qt$Äèw
H®?p§ñžôñÜu}€äaf ?3-böx<Y{ŽOßýþÊ5ÿ<
w~/B»7¡Ý;ÑîýcuÊYôû
þù&:þþùt\ÐàØzèhr:}t.4ºôäu_ÌñQ0
No]hõ~4úßá:}ýýÒªI\Ž:×ÀC,) ¹×ÃG7ÀG7 ¢HÈvçC»{)vC»«¢Û
Ðíf>D:¡Ùœü[^÷©2œïód²¯yŸAûYé;d=QãGdÎcQŸhÿÉÙgü79ãä²ßÇòò»Ç!ëbÃ+ž€×ÈÆ7ÈÊdhzÈB¶æ"sóÅEÉèRdw}=šŠWãk]M4ÖAKtœ¥f
:â«{¢í}ÑöÁr¢ëïcÑ÷ýhùq8§ÑôËp n ëÁ]ø}¯N×F£Cstº=tG«ûFzý>>º:ýn°Írâ¡sáß~±LšYfT-cð§¥EáÒá¡Cýª*øOÄw€' z ÇÅSÇÒ{ìà-· »ÿëÙü¹¿bF=+úMôûºÑñË¡°PØ'OÞ§øòDÔįnÜã©%îsß?PÈ_ÏjÇÏÌ1z²yoÔÉô}šA}¡Ž£&µfÐgnµ ëPÙŸ#ì?Â>$ìGŸ$ìOÂ>¥8}Lú\ÁhÂ>ôc?zQo;±?¡5žŠ>úìau»¢&*AM×W/È£±¬ªA&}Û}âÉ©óôÇÓÛîzÃÉ5ž%§üñórùiÙíÇd«MŸ[Ö ¬Ë`9®wê:5?ø\rÑšçW>?2Aú×Òºû0ŒÊ0éàäSï+õŒ»TöÎò¡·ÞZ
zsy\ÉKÍã@#Iã
¡$óÚ<K?íUå9ø^öòñ/òòŠ}(ÉÓËx«}Vá€Gœ0@fáÁŠBØ/$ÏAØC÷!ï{@ØWä}nxsRB®SŽàs¯x®¢9玧?Ѐ]ú¡ìF6ã3ã7çjU§uä{<è/ß eßhC7Ÿ
ÐÆ2Pâ°[â°[JWmËnwÆÚW*é)£¥žBúµäÕq
ϧÓ8ì¹õ»kEu3
Ÿ]Ên¹+åërQÎÊ59Å»#ÑwãÏ9ËuÊŒLÒê"É€ó$+µ.㮯ã®Z×àÎõA=TûS&Q+jK'zÏŽ¿ô¢Þ|ÑÏeŽöÄe÷Â]wÁ]wÂU·aeÚ°BšapÕ-äwÔý%Ä>/úTCÙè3€fÒQ;D/µnÐÏÚ°KágOíرv²Þhµu
u
öl£îî£wú:üõé§~¡>ÿbåW&ØH!FƧïߣÔ?J:T6-dDi3A6ŒAXÿÿçBšéWœ_ð~Ò»ø>ïå»|š¯öQŸÔÇù|:íYtÜßãîÆúbÜÞräkœïðvÝÌz®¬êgP^O÷_ÂAþâE9ÿæ9üwzí;šÍ^;%þ.j;>OQ%CÁÐsßÂç]³ŸÛQžôÞñqŽñéœ_A}ãïãïáíÑs§ çNCN
¿K|ÀëPÒs<Œÿûy¿ÂcªÁM<ÝUžç©'pÿ©éÁwR9¶PEè#CE¿Juù^À]£Á>\ïÀï>PóÞzÕ»é5žìíõ·Ô3ÞXOz]=êÕôWÐ}^Rwx(ª=®õ·u9j¹gÔù(ÔÔiÇ×(Ô8º<'t9à>óéGÓ
nŠU±ø¿ÊCµÝ²¬¥ú®÷ØãÐß
¿áœÇ§±÷éÍ' .qTõ¡T÷!òîãñn[W±«powØ; ñu;ñu[èÏ×KÓe0ø=éÅ;BKzñÆð1œx9(aµq#µñyao^³fØ×ÃïÕÃï
=z9[£œ¬äÌšOo!3àòj,p®ésò+p{r¯9Nª1ùX
-ÃúŒý?ê1z¢€Ñiäý4ºê8µ¹hÁR1x*«QÕtáéÆw ;p{{p~Çå4åÕ.Ÿ³bððKð~ä%ŒY4Uâá÷C"ý
VánÃQ!Ì`ŒbäÆ©b¶Åq¯eQJ<I-¢>OÙ§mÍÓwf5zàýúi
Ô¥
N·|Kï>
æ.@WàõöãõàõNÓ¯_°oÿMs°Â9¢=6œyBûöôëé ìÝsYü_v*+®<+ý{¶ša/ß÷= ìïò>7Œ_L ðqà%÷œ5ä=ÏP#R0¿ZZVi9üjyvªXIŠhEJmøg¥ÕQÌÚøÛzÏíOmèIMè]©m© ͵-ž£|¬]ÙÑRýÕ}_¿dGI
££@=B=.¯°£±©J]xÆNÞEíoÉ^jÁ jÁYjÁuÙ/·ÙÅ{²Z°Nbé
Is]çÈ:>Q'Kvv1äù¿O=(¥¥òÔrÄUUvõªTKªUb®»Úøë®I_íNeëÁ®uqìð$âtÕm&q»0ú@KÙÀS®gÇ·ÁQvý\Š:Þ¿'ú,«u¢u"ü|«ÔFÑg^€t>kÂn5¡º9ØFæXkYBn®!G7«;šÈÛÔãôiçÈçsö9N¡?®a ÀAÆIÃQžñW'ÞY!9}®~ŒÛyס#Ëè)×H1ú8õŸ~s;}ç^i[oqPütÏý6nè.®è®Ái
ÇqÁÇ©ÿSã©èu3ë*ÏŠë</}pqÝíeè+Ñ× O®O¿ü }skúçÐA/ywôµîm|î ×?ÿéÁ§¡ÓsÑìe°
¡Oß
BÛOÁIzøð³Öð3×[ÔðsØ°&ÍÑÕÙݶŒï_ÁÎ
`<µh,
%Ôš-;Ø áµë8uìœð«ö¯ßŽÇþØþv¡îÅö?=!u0
ßò4~Ã3û5\û%Ïëçqígœòr~Ì+ûa¯í»ýSøÄ·zkhã«Œ|îK|/ðá0êüµÿèãá;ÿÖ§ûÃE>ØWxwßî= #£4eÔfð1w©ÆÃÞ ¬ÿ?G¿uKC]È&Èÿi0»ññ?Ã)üáEzÅkôÏð÷òâ{%I
IŒŒN¯2à_߬^ª+¹éâuá{?2xàÊÞ*Ö>±~ùüóéãÃÑDÍ·DÍ÷ôSégÈÌ<_B¯ž>q}âÙåûé÷Á99ç7ä*=âU*åMÿ[þ$òþ€?|JÔ=õDA"HN€e÷3±óÙè h*ú7 MPŸ¢,=a%zÂZô
é?êÛAsÍ9¶ô%mé »jÞàK-ùZ8£E h°p=à>اµRð\ëZ
Þ§
=bà_€ŽjA
Hg5ÜP×å ªU¡gªBïX WS)èO?9V[QúÆž üDZ"-_pÌòiïi9³ôcW,Gð;ýä-Ëܵ,Á_öVðØ2/è)ÓÃÅò4AzÈþJðýc~ ýbi\XU"³ñÐÈ%N~!ÚÎ;?qð1øÁõxÁ¥>Åçá
'ãÇûJ¢m-ѶOž3÷y'®hEL5àêRÿW8/JŒ`ôøÀ<xÀwü.qÿ·gàίãSÓ&e&Ið ü¿ÂÌ®ö¹ôø9vÜMNÆàíÖÃR:ä 0'ë-éPCq^
ãéàMHL'ø ÿÐ=þ©ÉðI+hÂ
:Æø¿DÉ,tc2ã·DηøÀx¿!x¿~èL?|_ô§3Ÿ¯þVóZú3ÚuÜËêOhÙ/š»ü]È«ÛÐžÍ ¿ÒéROßK 3ñyÓü%åcºÉûð@Ÿ&ráñùUéå?ãõKßÆî:øŒêŸí]-¥})4ùùÐ×çF³CÝÎÏûŸB>òŸN>ªŸIª@-4»m3²Š)tôSdÜY:Ö³hõuŽú6ó®1dÏxt{²þHÍ!y24;œnð,ºÅsèvϧ{ý}=èè/¯'ŒöõŒ7D«Û£Ó]Y§^ÐîÏÚ
EGÃ(<õw¬íTNÏfœÃÏT±þ«`¥&Ä'F£wÙ£ðsÙðóÙ8ì_øymø¹møùmø9nøynchÄûÐúqÎPã%°Ö¡Ý[,!Y Ñ£ÑOÑh£O,&F£SéÑè¬ô-¹ 'J.FWôÓ^ÝOÐ1€c:èÍQÖöÐÁ·xoßàaý/óÑ0
"ÿù{6œY>oòÏ|/Wíõ®Ô[Á'Ü¥Ÿ_!®P®{-šä·É€ÛtWŒR^îïÁÛ+HïñÔþjxø9Qj2%]ð§enZæà2:pƲGÑ'Øýì¶@°Ê
¼R*C
+ÖA#«ÀjVª@Yô§\hRîèçáÏ+Â[?¿þ<#ü¹Fš{áÏ:ÊëµTð
F¢£`zÙ
íìí£dZ -¡fjkÆàcšþÓÔA ²³ &
A}5xKãoj¬ %DÓ)=òGr(œî·ä_Ó~PvÙÛ}lÍŸYÖørYí³eüèÓɶIdÚ$ùNh#_ÁP%_ø0ùÌ¿®ÐÍûÓauzÞÓ§Ó¬kEÖ5"Þk ¹ŒN©.|kª
Õ%5/WÄ^QâRãz:òàCyJœ|jÐaÔÐVPQSYÙáÏͶàµç@ø3µ©øïñþmtä×Ãúü¿ÿçójô»jwå1±{_ñ'Ÿâ&Ÿâ:ú3=öQ|ÅAôu7Z»
|
Q³ø¿áåPîèzUÿxîE€uBý[שµŒ 1×ÄKá?Þ§ä!ÖÓ@R"ô¡µòÛFìÃvkæëìS_lM|&LŽ>ÊêùVÇ?³ÚÞÞª{S«ê[E¯h匀öV³[Ï`
<¹åõË_j6šýwMç5Ô€~@_ñmÛW« mºÞ· ú»Ô«6H/Xo=iôµÐÝÖH·XM]guÔyVX§Z6mu¥Ñ>L»YBmg±µÖ·§RÃîKûC>°ôGWé.HfûYÒØqIf?I|Û/f{å±n§{ÝJÿ³I.ê:9¥kä ®ºg¿ÞlÌ£«øÆë<zy2£/Ôçu
šÀ±RPsóp]V:ôñ:c%Ñ
@·ÐSn§Ù-èZîÈa¹A/s-êi¶ÐÁl'²^g
ÄáúDñÒ1vîKgI:âú#]ËRþŽ)ôåõ`ͱñð#çÍã\»1v2ÿÃy¹\âÙnñ÷xÖ§º3zöWì0œäQzÉÕÎI»,ïÛoRu«Äú}Ì:6f=[Y\íÄúöbZfk9t²œ§³¬.²ÊºÉêèNk¢·nzÎú±CõŠ}£Ùöv®Ÿ°åìõfö|{\SûMï7{ÄÆsÍãq¬¿f
ýMâçâ(?ñT"«ª^Ëjú'Ä\[b¯§5"þ-ËÄg+âŽ
ñÚÎÃiëàWà¶uòdD~:ô;+äõv8v^÷S
X¯KÌ7
¶äA7ò¡¹1M®ÇßL%æGKȧ5žšMä×N|ü~ŒÎQ²æyxZrŒü3ò7±ý
¿°0o3ZÃŽ+©«ï¡ì£Bÿ¢ÿÇÉÁÃ|úòðRô+ù©¹qSïàŠ2E¿œr×Sú=OD]
?E{fü=ñ;ö̯Ûs¿d/yÞ~Ì4úÈí°ÙbÓ`Å :G¿ý+šr¬çå\ó€eä1ã0öËP{qCwõßÀ]Â
ÕÛìÙ-röºï òoÖ+äí/ŸX/PÙÏÐýìpG_ãé! ûü3ÜQWÜQ[ÜQs]ïtµ×Ñå^UûG8€:Ûàòë$Ï©ümçt¿¡Ãü5ýÒ_ÕþxûÞtÝp)p+mPÄÔ&þ+Úý}Å9úRÎB»÷¡Ý;ÐîÒFyÚ
ºð
Ýol(âßÉcûZîÓÿa_Éoö¥üB÷|.úž}uÖ»èŽcèº×Y;YadµYö)ÝÍn cèâZhµ¥·ÕnV]ÚYUºøÊtô¥®}$Õ¬úS\úPZi4š4T<+)I¹WB®iI4§€ì×"rDË ž¡Ñ£ò/¯Í
K*+B~VLòAQ®+Å cÖeüFܧ÷lÇœ»1>Ìe óÎüÆ0ÏpÎSQô¬YôL¬Mô{xÖC<óI=ü$áª
¬É¬Í?6JþµošoßQë&Q÷ŠI
)i|>œßRz¿8Òµòkÿ¡¢þóŒíSö,Ü»pÃœæÉ£œ
÷8Üë)[§³÷³œ.ôÒžæºÒ«ã ëèFo¬1ÞRwà0÷xwÜv_âj0ñ58GŒM$îŠóÃåÄäzh1ºXý=Eì^Ô~XŸËšÏÐçxO@ì¿FŒA>dìäÇ{/(¥-AP
êÚ«AkèlÈ£DÁl^¯Í;Ç8÷,×]âúpñ2îsÆwçx·$t<)É×7ÉÛ·Èßìäñ{äs!òº8ùþVD\g
r¿.Tc:ªæèAk?I?ÔCÝHý.ìP/(LžðLÄLŠI*.i œÌÌ2[²Ê\É!ó%Œ'¥ ,²TJ@IY.åd¥TÕRYÖJMY/ud£4ÍÒDb€lVÐNv!Ýdô>rHŸdã2RNÊùYŸÓòœeFçÉEfp
»_á®×¹Û
îr»Üæwý.£>`Ôr@1ÒFzÆ(/åï*äUªßM§È«ú'UðoªçcyMÿ¥Ÿ7Ô5ÆÑ@3i"}Kë;úºf绹ùî»|'?ß)È»ü]RèŒ*§¥µªVÔêü©Í:ZOëk#m¬hSmζÚSûjçþÀx!ýõMH˱7 æN#žÿ×ú¶~ÇÝ&iNÎçê{º».׺VéfîŒ;ïfõ#=Šõ4ó8¯5õ
ãßкz[ê=fñ9<ÓªÖVcYGM`5}Š¯[_}Óh&¬ïØWÃFh^ûZØ8-jŽMÓ
øŠ*6_?¶ÅÚÐVks[¯mmv·CÚ×~Ò/íõúþ`ðMt=ÇC©°X¶ÎâÙ{Õ¶Øk¶ÝÞŽÃö³wìåŽÓö®·vÉØ5+i×í#»cUíÕŽVÏþ±öÔ>±¥ uÙŒ³Åöî_ø÷·Ä>Øù0Ká#,eišÙi|¥ãX:ÿÜ2RÇ3r~fï
ë³xGËÊX!ÙŒ%4·øËÔþ\ÞZ¯µñ5¡ºåóªPïP>ÄsxßA+(êïYqrÛxüm+
?-
×(Cý+ã¯[YO¬<úPÞãYwP«nTâk5Ž£Ç>æzïßßñ~#;>#·uã^=Œ°õÆ·ôóÒö
dÛæ:yfþcyoy¶ïyÆx橬ÃÖck3uZÄz-ñol
O°U>ÅÖùtÛàsm3'ÆWÚ_o{<Æöù;äûì'ÿÉúI;éçìgŒÀ9<Á|Ï/øËø_ýýæ/íwEÇ8¥ÿ.=Æc<ÅküëïºÝb¥=vðǪú+AO4ò€ASOŽöAgOôô4A_OöôÁÏ|ãoýí`¿ÌõìÁbϬöwþ^°ÃóûŒ`pÔ?{à®yÉà¶îùÁ/hðQ'š$
*ɪAÚ fÒÕ×yï'áø«/(àbžŠtðq1ÞC/<`ü»p{ÝàŸ×žÿeÏÍýrgÓIæv9b®ûóÏÀÜÒ1<ÇFg-ϵþz)ϹçïÙ<ûtÖ`
k1Ñãß±.ß°>_³V#à+ÖíKÖ¯?ëØ×ÿñ¬iWÿíþ?ù^ïwŒåMüÞožÊðg°éÂ~ÁU^ÀUÃUÁUÄU§ï?êÅÐûÂøÃü~:±žœÙFíñŸýÚàoø:ön¿æ«üU\i<pºŸ6_8ÃÙôoSýM&Æû
bí:1wÅÆøEâïqxÆ/Cü8±ù3±| Ç¿àŒ/ü±{nXÆèCõfŒÞÄR/ÆéÁœzøsâ]qÍî]. ¢sëgmÇ<ÛyrŒvJx¿ý€ÅogLôoÁÛxïw"xNÈÍjœïyÖ"€ëRî¶kô1kRu©áETc=CªxešJw[jã®ëDe²¬}âüž¶(ãœÏØžW>î9äb^9XëlÌ7óÏȳ€gÓñ©yæTäS
Ö"©ßEãn¡u×-.y54Öó?ÿÈ!Žq¹Ãþ¶4sœÝµvÛÚ-[ÎFS§¡ì¢M°³ö
z;ÂNØvÐúÛ~ûÌv[wÛim«µG[¢ÓMÑëƶ
í]fµmU·VÑæX9e%l²¶ï-¿G·ÇZvûÚ2ÙWhú`{ÝÕÄ0bëlΚϩ·š×Ž×JvFËS/Ú-d1Çj[ši©/¯Ñ·œf+©Gà'MdáŸjwà.µê<×xj;€
7©.oÃ;Ü0¡âí¥Vê\ÑsuKhmOÑmjùþ]ÍìªÚu-ÇJ2ÃÂvZsÚA}ËöRwPcÕzT_ê|}¢³õNÔëÔåKÔçs:LOR¯÷égTâî£Úš+©¶sñÓñšÈßá
Ÿ¡R b7ÇOÔ×W9zÔí§_wõ²d×sò¶Lúý®èÿÿŠ8ºï23?3o3ó-g4Þg(>h š\x¥.xŠvø§rÏuHêá¯jÊ.üØ6ŒÙf)[*k*OËÊËK³JÍBÏ»Äü`èÿ÷¯u
ÿ×ÿþµ®@jE ÍçÄÖsâì¥MiŠÔ¥göÙ+bŸÅÔW#Z"HâË-9€€îŒoøj˱»úºZ²²¹Üª0F_HÍ\hµ·õëcîS7bŠÕgõ©m
}ÐúûŽLÄ\ݱOçEÐ9tVÄ|tn!¬DëVÃzô.d3Ûš«;`56d:žö£
!ÑÂ#há é§ÐÃÓ6,â¬
F¿þhaßkö9ôD»GܲÎÐüo
-ÑÆO 1Ðꣿ£5
ZQ * e úò¢×ñ ¯±;øû^Ä<ÖtâñxhWàë"çSp59qÇpöa8²ìœvíž»v\A?®Ø&FÙÄ(ë#ÎÛjgeÄ)[qÂ3ÚbFÏhómnÄ^Ôjì²èÙLÛFmµDÔjXNt
,Ž\5ÑèwûtpÄ\Mâ!ûT#ès`alþï_ëÅëzùø=þ=þO<g¯¿e¯¿eÇúFØÌÆ°[a'û²}ÙKM;GØÇc6ú³ßýÙ럧ÙÓÓöûÝ3â<ûz}œd¡-ûݲߡ!û]êRkA
jbšÄþž·ŒÏ|ÀÞ>À>$²Çȹ<ç=þŸÇ»ÑÛìÛ-žÁ«kp
w#nPn°×ØÛkìÄ%vâ;p==Ïf?CNQUBN°ÇlcÄö5ä0{ºv³+!;©:!ÛÙÛÃNmìíZXÎÞ,doçñK§EìÐ)ÛtRD~±\ãxH>³mú(b>Ø£"ŠÁÓ`:=æá!YÅèÐJ4(d5k¶ýYþlDB6£AÑ {3b+ºCN
lfýC6gÙõèÎzöh-{²|\É>.
äjÈ|ö6d¶5Î~OätÈm±KGìЊÛô±\WEÄèmúcıK'GÐ"&Ùÿô¹Pôï2ŠôzÄÒë)ËqÚ
E<²©rÚVE²5Çl]Ä!]q@WEìÓ©sµìÓ4}Äÿ?ÏÚG÷ÍGõ:fɹgʳ*⌥žhi".1·++âÍ+Ì%ämžh`³qʶEûï×ÔË]º%bnØŠ"bt^ÄrÍ¥!1&bŠØ¡©"viÊôÿ!§,|ÿëWÑóäIGö¶§p6!ÇèCnéäÛ:6âž«C"îé :úÑ÷x¢œéÚ{ã=zEžõgÝð%Ýô
«1W»YÈV#"UÃUÃU ¿ÄUÂýT ?/eéÕËDÜÓRðšhÄzÿÛ#âw9ë
9eé"N[øüÿÛó¹ÑTöÌ«=.®qÄrmc!I¬QDkñRëE<Ó:pcáÖž{»;»Ëo3ç[Ì9äó
¹Î|¯kqû/ù+sœª¹ ]æ®!§íµóR¢z)Ñž4W,sÄ¥!WlQÄ%<^ÈEf|ÏwÎÚêS¶6â²N
Éz=ùUÃPüàìß
ýœîœÙãÏØßìm÷ÚUÂ#íñ¿ø^j{UÖ-
ëçÑ¿úÿ1šDÐÉêyùºÎªK©_Toc410402794eaDÐÉêyùºÎªK©_Toc410402795eaDÐÉêyùºÎªK©_Toc410402796eaDÐÉêyùºÎªK©_Toc410402797eaDÐÉêyùºÎªK©_Toc410402798eaDÐÉêyùºÎªK©_Toc410402799eaDÐÉêyùºÎªK©_Toc410402800eaDÐÉêyùºÎªK©_Toc410402801eaDÐÉêyùºÎªK©_Toc410402802eaDÐÉêyùºÎªK©_Toc410402803eaDÐÉêyùºÎªK©_Toc410402804eaDÐÉêyùºÎªK©_Toc410402805eaDÐÉêyùºÎªK©_Toc410402806eaDÐÉêyùºÎªK©_Toc410402807eaDÐÉêyùºÎªK©_Toc410402808eaDÐÉêyùºÎªK©_Toc410402809eaDÐÉêyùºÎªK©_Toc410402810eaDÐÉêyùºÎªK©_Toc410402811eaDÐÉêyùºÎªK©_Toc410402812eaDÐÉêyùºÎªK©_Toc410402813eaDÐÉêyùºÎªK©_Toc410402814eaDÐÉêyùºÎªK©_Toc410402815eaDÐÉêyùºÎªK©_Toc410402816eaDÐÉêyùºÎªK©_Toc410402817eaDÐÉêyùºÎªK©_Toc410402818eaDÐÉêyùºÎªK©_Toc410402819eaDÐÉêyùºÎªK©_Toc410402820eaDÐÉêyùºÎªK©_Toc410402821eaDÐÉêyùºÎªK©_Toc410402822eaDÐÉêyùºÎªK©_Toc410402823eaDÐÉêyùºÎªK©_Toc410402824eaDÐÉêyùºÎªK©_Toc410402825eaDÐÉêyùºÎªK©_Toc410402826eaDÐÉêyùºÎªK©_Toc410402827eaDÐÉêyùºÎªK©_Toc410402828eaDÐÉêyùºÎªK©_Toc410402829eaDÐÉêyùºÎªK©_Toc410402830ea2Dd¡$bèèð<²
ð
CðA¿ÿð2ð¢ëj}ò%æ&Æ!×Þã9Šÿ~`!ðvëj}ò%æ&Æ!×Þã9ŠC~`ÛZšÊDþxXklTE>3wÝ×Ýmʶ]máFimk_4"AÀºBxXë³)f)k©Ð.Ž5h?
&&HbCL4š£Â Aý)Mÿ F0úC£ JgæÎœwîÝ÷âÞÜÝsgÎùŸ33ç¹|¢D`°ÏŒë=a·ñãâÿNnVaíÐÀhj,õžÆþ»Q lû€{ÎpýËe¶ àÅö%â.%üC
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
¡¢£€¥Š§š©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿ
þÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ1ýÿÿÿýÿÿÿýÿÿÿ_lŸ€cdefghijkþÿÿÿnopqrstuvwxyþÿÿÿýÿÿÿ|}~Root Entryÿÿÿÿÿÿÿÿ{ ÀFncHä)œ@7Mç)œa@ÆData
ÿÿÿÿÿÿÿÿÿÿÿÿÏÛWordDocumentzÿÿÿÿÿÿÿÿ &ObjectPool}ÿÿÿÿ#àÄJç)œ@7Mç)œ_947279105ÿÿÿÿÿÿÿÿ ÀFàÄJç)œµ¥Jç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿPIC
ÿÿÿÿLMETAÿÿÿÿÿÿÿÿÿÿÿÿbFþÿÿÿþÿÿÿþÿÿÿþÿÿÿþÿÿÿþÿÿÿ
!"#$%&'()*+,-./0123456þÿÿÿ8þÿÿÿþÿÿÿ;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghþÿÿÿjklmnoþÿÿÿqrsþÿÿÿþÿÿÿvþÿÿÿxyz{|}~L@Ì£$dèèþÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qLCV&Ôèè@Ì
1&ÿÿÿÿWordMicrosoft WordDûŒSystem
-Ã)¿ûµÿŒ"ArialO
3!íw*íwÀgïwO
3
- 12
8¿D clearToken [
({generalID***..**.K.*.**6
2
IhDb.2
8D XOR random2:6*...C
2
Iv DbX.12
8€ D XOR
}E )
]2:6K2KûÿTimes New Roman*íwÀgïwµ
*
-'ÿÿ-^
GûœÿŒ"Arial;
-!íw*íwÀgïw;
-
-2
GD EPA,,0'ÿÿY7{-2
{D EPB,,0'ÿÿ]M-2
MD Request0%))%%'ÿÿ TûÎÿ"Arial
E!íw*íwÀgïw
E
-2
^ DDH-secret $$'ÿÿú-ßß5ú-ðü-ú-$'ð-ß'ÍOß-üÿÿÿ-ðú-¥0¥J-ðü--$?9¥?·¥--ðú-ªª5-ðü--$'Á-°'O°--ðú-m7mQ-ðü--$F[@mF~m--ðwÕîûµÿ"Ariali
V!íw*íwÀgïwi
V
-
2
ýD -.2
ý(DclearToken [
(generalIDÿ***..**.K.*.**6
2
Da*2
ýÉD, random*...C
2
Db.2
ý5
D)
]aK'ÿÿ=Cäç
-2
ñç
DResponse0%%)))%%'ÿÿÖõ
9%-#2
H%D clearToken[
(Dh***..**.K6.2
Y©Da, p*ûµÿŒ"Arial"
!íw*íwÀgïw"
- 2
HýDtimeC*
2
YDa*
2
HÂD)-
2
YÛD
K2
H&D],-
2
HTD ,- 12
HiDcryptoToken[
({generalID**....**.K.*.**6
2
Y3
Da,*2
H]
D, timeC*
2
Y"Da,*2
HLD, Dh6.
2
YÚDa,*2
HD} Sign2..
2
YÙDa,*2
H
D)
]iKûµÿ"Arial(
!íw*íwÀgïw(
-
'ÿÿ·â&Î-%2
5ÎD clearToken[
(DH***..**.K66
2
FoDb
.2
5D, random*...C2
FÛDb, a.- 2
53DtimeC*
2
FÎDai*-2
5øD)
],K-
2
5D
- /2
5ŽDcryptoToken[
({generalID**....**.K.*.**6
2
FiDa
*2
5D, timeC*
2
FXDb .2
5D, Dh6.
2
F
Db .2
5B
D} Sign2..
2
FDb .2
5ED)
]K--'ÿÿú-âgâ
-ðü-ú-ø0-ð-ì$-2
DPhase 2³.*% %*'ÿÿ-ú-0-ð-$ª-2
»DPhase 1³.*% %*'ÿÿ-1Table
ÿÿÿÿmšCompObjÿÿÿÿÿÿÿÿÿÿÿÿhObjInfo ÿÿÿÿOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿ{0
[$@ñÿ$NormalmH <A@òÿ¡<Default Paragraph Font
)/9?f©Riÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
)/9?f©RU
ÿÿiÿÿÿÿ ÿÿiiihð8ð@ñÿÿÿ÷ð:
ððØ ð( ð£ÿÿÿÿ
ððx
ð
£ð< ¿Ëÿ?¿ ð ð
ð ðr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6¿Ëÿ?ðð
ðð<B
ð
#ðË? ?ð
ððŒ
ð
ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿ5MÖ&VM&5M@¬¬`ððð<B
ð
#ðË? ?ðððŒ
ð
ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿTM+B&TM5M&TM@¬¬`ððð<B
ð
#ðË? ?ðððŒ
ð
ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿ5MÖ&VM&5M@¬¬`ððð<B
ð
#ðË? ?ðððŒ
ð
ðB NC NEÁFÁ¿ÀÿÿÿËÐÑ×ÿ?ðÿTM+B'TM2M'TM@¬¬`ðððr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6¿Ëÿ?ðð
ððr
ð
ð6
¿Ëÿ?ð
ð
ð
ðTB
ð
cð$Ë8cÒÓÔÕ?ðððf
ð
sð*1111¿?ðð
ððf
ð
sð*1111¿?ðð
ððB
ðSð¿Ëÿ ?ð
iH.(0¯(j°$!%j°(¡)j'É7'jÉ['ç.(j¹"c#j5s)I8F*ji6",8V#j×)
0Ò*j§±'7(j@ýD%`7&jÏ
#&5$j¹æ(Â5ç(j¹$Â5$j5n$6Ã$j êu&õ5v&j
¬K& &j5Ë(6 )j
úº*6»*jŒ*ä*jjjÿ@ips2c\\NRCCSL01HE\ips2cPSCRIPTHP LaserJet 4/4M Plus PSips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BB(;ÌiP@GTimes New Roman5Symbol3&Arial"ÁÐhžãf!¥ÀŽŽr0¹ÿÿ
James TogaPekka Pessi
þÿÿÿ£þÿÿÿþÿÿÿ ¡¢þÿÿÿ«¥Š§š©ª¬»®¯°±Œ³Žµ¶·ž¹ºþÿÿÿœ¿Ê×ÀÁÂÃÄÅÆÇÈÉÔÕÌÍÎÏÐÑÒÓþÿÿÿÖÞØàÙÚÛÜÝßñàáâãäåòçèéêëìíîïðþÿÿÿóþÿõö÷øùúûüýþÿÿÿSIÿÿÿÿÿÿÿÿ@É 1&ÿÿÿÿWordMicrosoft Word~C
û-ü- úÿÿÿ"-Ã)¿üÿÿÿ- ú"-Ä)¿ûµÿŒ@ Arialµ- +¿.12
+¿C~ clearToken [
({generalID***..**.K.*.**6.âûÎÿŒ@ Arialµ-Jh.
2
JhC~b.T{°¢-+.2
+C~ XOR random2:6*...C.T{°¢-Jg .
2
Jg C~b.T{°¢-+ .12
+ C~ XOR
}E )
]2:6K2K.T{°¢ûÿ@Times New RomanH-'ÿÿ- --_
G--^GûœÿŒ@ Arialic-G.2
GC~ EPA---.T{°¢'ÿÿ--Y8{--Y8{- {.2
{C~ EPB--0.T{°¢'ÿÿ--^M--]M- M.2
MC~ Request0%))%%.T{°¢'ÿÿ-- T--
TûÎÿ@ ArialNe- V.2
V C~DH-secret$$.T{°¢'ÿÿ&ÿÿÿÿÛ9ã ú"-
-%Þ5ß-ð
-&ÿÿÿÿ&ÿÿÿÿ&ÍPñ-ü-
$&ð-Þ&ÍOÞ&ð--&ÿÿÿÿ&ÿÿÿÿ-¢Nª ú"--%0¥JŠ-ð-&ÿÿÿÿ&ÿÿÿÿ@ž--
$?9¥?·¥?--&ÿÿÿÿ&ÿÿÿÿ§9® ú"--%ª5ª-ð-&ÿÿÿÿ&ÿÿÿÿ&PÂ--
$&Á-°&O°&Á--&ÿÿÿÿ&ÿÿÿÿ4jUq ú"--%7mQm-ð-&ÿÿÿÿ&ÿÿÿÿ[G--
$F[@mF~mF[--&ÿÿÿÿ--xÕî--wÖîûµÿ@ ArialT- ó.
2
óC~ .T{°¢-ð(..2
ð(C~clearToken [
(generalID***..**.K.*.**6.T{°¢-.
2
C~a.T{°¢-ð».2
ð»C~, random*...C.T{°¢-ù .
2
ù C~b.T{°¢-ð
.2
ð
C~)
]K.T{°¢'ÿÿ--=Däç
--=Däç
- æç
.2
æç
C~Response0%%)))%%.T{°¢'ÿÿ--×õ
9%--Öö
9%- ;%.#2
;%C~ clearToken[
(Dh***..**.K6..T{°¢-Z©.2
Z©C~a, .T{°¢ûµÿŒ@ ArialNe-=á.2
=áC~timeC*.T{°¢ûÎÿŒ@ ArialNe-
[|.
2
[|C~a.T{°¢-=.
2
=C~).T{°¢-Z°.
2
Z°C~
2.T{°¢-;â.2
;âC~],.T{°¢->.
2
>C~ .T{°¢-=%.12
=%C~cryptoToken[
({generalID**....**.K.*.**6.T{°¢-
[ï .
2
[ï C~a.T{°¢-=
.2
=
C~, timeC*.T{°¢-
[Ð
.
2
[Ð
C~a.T{°¢-=ì
.2
=ì
C~, Dh6..T{°¢-
[z.
2
[zC~a.T{°¢-=.2
=C~} Sign2...T{°¢-
[k.
2
[kC~a.T{°¢-=.2
=C~)
]K.T{°¢ûµÿ@ ArialNe-'ÿÿ--žã&Î--·ã&Î- (Î.%2
(ÎC~ clearToken[
(DH***..**.K66.T{°¢-Go.
2
GoC~b.T{°¢-(.2
(C~, random*...C.T{°¢-GÌ.2
GÌC~b, .T{°¢-*.2
*C~timeC*.T{°¢-
H¢.
2
H¢C~a.T{°¢-(Ÿ.2
(ŸC~)
],K.T{°¢-+e.
2
+eC~ .T{°¢-*z./2
*zC~cryptoToken[
({generalID**....**.K.*.**6.T{°¢-
H/.
2
H/C~a.T{°¢-*K.2
*KC~, timeC*.T{°¢-
H.
2
HC~b.T{°¢-*/.2
*/C~, Dh6..T{°¢-
Hœ.
2
HœC~b.T{°¢-*Ü.2
*ÜC~} Sign2...T{°¢-
H±
.
2
H±
C~b.T{°¢-*Ð
.2
*Ð
C~)
]K.T{°¢-'ÿÿ&ÿÿÿÿ^Ùì--
$gÚgë
ë
Ú--&ÿÿÿÿ- ú"-ù0--ðí&- .2
C~Phase 2/)% %*.T{°¢'ÿÿ- ú"-0--ð
&«- ¯.2
¯C~Phase 1/)% %*.T{°¢'ÿÿ-WordDocument
ÿÿÿÿSummaryInformation(ÿÿÿÿÿÿÿÿDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿ_947279106 ÀF`~¶Jç)œ@GÇJç)œì¥ÁG ¿ibjbjÙÙ ì³ì³Sÿÿÿÿÿÿ]JJJzzzzzzª¶}}}:ÙL%Lq$`ôTTJ}!
\}}}
}<J^l}Î|J ?3õŒzz
DH-secret
Phase 1
Phase 2
Request
EPA
Response
EPB
clearToken [
(generalIDa, randomb)
]
clearToken [
({generalIDb XOR randomb XOR
}E )
]
clearToken[
(DHb, randomb, timea)
], cryptoToken[
({generalIDa, timeb, Dhb} Signb)
]
clearToken[
(Dha, timea)
], cryptoToken[
({generalIDa, timea, Dha} Signa)
]
"4TUlmuvz{ ¡ŒœŸÏÐØÛßàåæþÿ
(+/01245NOUVZ[abefgiøîâØÌ¿Ì¿ÌØÌ¿Ì¿ÌØÌ¿Ì¿²£Ì²£²£²£²£²ØÌ¿²£²¿Ìز£²£²£²£²Ø6B*CJOJQJmH56B*CJH*OJQJmH56B*CJOJQJmH5B*CJH*OJQJmH5B*CJOJQJmHB*CJOJQJmH5B*CJOJQJmHB*CJOJQJmH
jUmH9!"*+34=>CDMNSTz{ŒœŸfghiûùùùùùùùùùùùùùùùùùùùùùùùùùû0ýhþþ°ÀN °ÀN!°©"°w#"$Ü#%°þÿà
òùOh«+'³Ù0 ¬žÌØäø
4@L
Xdlt|ässJames TogaameameNormal.dotPekka Pessi3kkMicrosoft Word 8.0@@@piÃŒ@ëü2õŒþÿÕÍÕ.+,ù®DÕÍÕ.+,ù®T
px€¬ŽŒÄÌ
ÔáäPictureTel6³
Title 6>
_PID_GUIDäAN{753DDA04-612F-11D1-9D2F-0000C04BE66A}Ole
ÿÿÿÿÿÿÿÿÿÿÿÿPIC
ÿÿÿÿLMETAÿÿÿÿÿÿÿÿÿÿÿÿ ~CompObjÿÿÿÿ7hC »
A&ÿÿÿÿWordMicrosoft Word®ùûŒSystem
-ûÿTimes New Roman*íwÀgïwò
€
- \ÌûœÿŒ"Arial
(!íw*íwÀgïw
(
-2
Ìù®EPA,,0'ÿÿc·
û-2
ûù®EPB,,0'ÿÿeLûµÿ"Arial
!íw*íwÀgïw
-"2
Lù®(
.., generalIDK*****6
2
&Kù®a
*'ÿÿkXo-2
où®,
.)K'ÿÿx[8(ûÎÿ"Arialá
!íw*íwÀgïwá
-2
B(ù®'ÿÿkí
6-(2
6ù®[Not Authenticated]6*2****&***'ÿÿU6 ûµÿŒ"ArialÜ
!íw*íwÀgïwÜ
-A2
¯$ù® CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
À
ù®BC62
¯H
ù®)E22
À
ù®k-pw*.:2
¯>ù®
]K-'ÿÿú-xDx^ú-ðü-ú-$IOyIgry-üÿÿÿ- ðú->R>l-ðü--$a-[?aP8?-- ðú-H>HW-ðü--$IZOHI7rH-- ðú-Ys-ðü--$hóbh?-- ðEÙ
Õ-A2
Õ$ù® CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
°N
ù®a*2
x
ù®)E22
°Ã
ù®k-pw*.:2
nù®
]K--'ÿÿ8ÁÙ- 2
èù®(
, generalIDK*****6
2
ùù®b]*/2
è0ù®,
) [Not Authenticated]K6*2****&***'ÿÿ-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCx »
A&ÿÿÿÿWordMicrosoft Word®ùûŒSystem
-ûÿTimes New Roman*íwÀgïwò
€
- \ÌûœÿŒ"Arial
(!íw*íwÀgïw
(
ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿ9OlePres000ÿÿÿÿ: WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ²³SummaryInformation(ÿÿÿÿiž-2
Ìù®EPA,,0'ÿÿc·
û-2
ûù®EPB,,0'ÿÿeLûµÿ"Arial
!íw*íwÀgïw
-"2
Lù®(
.., generalIDK*****6
2
&Kù®a
*'ÿÿkXo-2
où®,
.)K'ÿÿx[8(ûÎÿ"Arialá
!íw*íwÀgïwá
-2
B(ù®'ÿÿkí
6-(2
6ù®[Not Authenticated]6*2****&***'ÿÿU6 ûµÿŒ"ArialÜ
!íw*íwÀgïwÜ
-A2
¯$ù® CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
À
ù®BC62
¯H
ù®)E22
À
ù®k-pw*.:2
¯>ù®
]K-'ÿÿú-xDx^ú-ðü-ú-$IOyIgry-üÿÿÿ- ðú->R>l-ðü--$a-[?aP8?-- ðú-H>HW-ðü--$IZOHI7rH-- ðú-Ys-ðü--$hóbh?-- ðEÙ
Õ-A2
Õ$ù® CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
°N
ù®a*2
x
ù®)E22
°Ã
ù®k-pw*.:2
nù®
]K--'ÿÿ8ÁÙ- 2
èù®(
, generalIDK*****6
2
ùù®b]*/2
è0ù®,
) [Not Authenticated]K6*2****&***'ÿÿ-þÿà
òùOh«+'³Ù0 ¬žÌØäô
8DP
\hpxäJames TogaG
NormaldjtogaTo2Microsoft Word for Windows 95@G@@FÎÆHÃŒ@2IÌܥhWà eÙ³ÆjjjjÀÀÀÀÀÀ
Ê
À1ÔÔÔÔÔ
=Ñ
Ýé8X#
Ô®
jjÔÔ
j,ÔÔ
àKIÃŒª²jjjj
CryptoToken [
(timeStamp, generalIDa)Ek-pw
]
CryptoToken [
(timeStamp, generalIDB)Ek-pw
]
(
.., generalIDa
EPA
EPB
,
.)
[Not Authenticated]
(
, generalIDb,
) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©t"ª20(ð )¡±ÿÿÿÿÿÿ2û/(``'±ÿÿÿÿÿÿ2ö/(
#âÿÿÿÿÿÿ0þ/&Ç$
2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ2ø/(/%#,âÿÿÿÿÿÿ2ù/(ë&$yÿÿÿÿÿÿ2ú/('#âÿÿÿÿÿÿDÿ/: 5q$cUÿÿÿ T*b*00&év&
D0:«M&bTÿÿÿ aS)aS)00&žô(
D0: 5Ê(cUÿÿÿ T*b*00&ù·*
D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ679=?BfgimpŒœ×ØÙùòêòêòäòêòêòäÝäÖäÐäÝäÎu]abc
U]abc
]abch]abcU]abch
U]abcuDa@ABqr®Ö×ØÙþS&ðþ£Øþ£ØþþØþþØþþÔÀþþÃÀþþ/ØþþzþþØþþòØþþþS&ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font0`rw|ÅÈÙ Ùÿÿÿÿ ÿÿÙÙ
Ùð"T¶èL~°ô$hÜPÚÿ@\\BAHARI\JF3-2-D13-4SINe00:winspool\\BAHARI\JF3-2-D13-4SI\\BAHARI\JF3-2-D13-4SIpSLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\\BAHARI\JF3-2-D13-4SIpSLettermic8Ä ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐhEHf!#
James TogajtogaDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿpØ_947279108ÿÿÿÿÿÿÿÿ ÀF ØJç)œÙèJç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿtPIC
ÿÿÿÿuLþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.LCÆ
V&ÏppCÆ
A&ÿÿÿÿWordMicrosoft WoMETAÿÿÿÿÿÿÿÿÿÿÿÿw*
CompObjÿÿÿÿ hObjInfoÿÿÿÿÿÿÿÿÿÿÿÿ¢OlePres000!ÿÿÿÿ£L
þÿÿÿ¡þÿÿÿþÿÿÿ€¥Š§š©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌþÿÿÿÎÏÐÑÒÓþÿÿÿÕÖ×þÿÿÿþÿÿÿÚþÿÿÿÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿrdAùûŒSystem
-ûÿTimes New Roman*íwÀgïwá
- \ÌûœÿŒ"ArialÜ
!íw*íwÀgïwÜ
-2
ÌùAEPA,,0'ÿÿc·
û-2
ûùAEPB,,0'ÿÿ+
mûµÿŒ"Arial
!íw*íwÀgïw
-A2
¯m$ùA CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
ÀæùAb.%2
¯ ùA, password)Hash
].***:..6**.Kûµÿ"Arial
!íw*íwÀgïw
-'ÿÿú-x>xWú-ðü-ú-$IOyIgry-üÿÿÿ-ðú->R>l-ðü--$a-[?aP8?--ðú-H>HW-ðü--$IZOHI7rH--ðú-Ys-ðü--$hóbh?--ðqm-@2
m#ùACryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
°ÑùAa*%2
ûùA, password)Hash
]m.***:..6**.K--'ÿÿ8ÁÙ- 2
èùA(
, generalIDK*****6
2
ùùAb*/2
è0ùA,
) [Not Authenticated]K6*2****&***'ÿÿ€ü- 2
-üùA(
, generalIDK*****6
2
>æùAa*/2
-ùA,
) [Not Authenticated]K6*2****&***-'ÿÿ-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCÆ
$
A&ÿÿÿÿWordMicrosoft WordAùûŒSystem
-ûÿTimes New Roman*íwÀgïwá
- \ÌûœÿŒ"ArialÜ
!íw*íwÀgïwÜ
-2
ÌùAEPA,,0'ÿÿc·
û-2
ûùAEPB,,0'ÿÿ+
mûµÿŒ"Arial
!íw*íwÀgïw
-A2
¯m$ùA CryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
ÀæùAb.%2
¯ ùA, password)Hash
].***:..6**.Kûµÿ"Arial
!íw*íwÀgïw
-'ÿÿú-x>xWú-ðü-ú-$IOyIgry-üÿÿÿ-ðú->R>l-ðü--$a-[?aP8?--ðú-H>HW-ðü--$IZOHI7rH--ðú-Ys-ðü--$hóbh?--ðqm-@2
m#ùACryptoToken [
(timeStamp, generalID6*....**.KC*2*C..*.**6
2
°ÑùAa*%2
ûùA, password)Hash
]m.***:..6**.K--'ÿÿ8ÁÙ- 2
èùA(
, generalIDK*****6
2
ùùAb*/2
è0ùA,
) [Not Authenticated]K6*2****&***'ÿÿ€ü- 2
-üùA(
, generalIDK*****6
2
>æùAa*/2
-ùA,
) [Not Authenticated]K6*2****&***-'ÿÿ-þÿà
òùOh«+'³Ù0 ¬žÌØäô
8DP
\hpxWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿËSummaryInformation( "ÿÿÿÿÍžDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿÔØ_947279109:' ÀFCKç)œàKç)œÜ¥hWà eãÓjjjjŽŽŽŽŽŽ
Ÿ
Žé1ÈÈÈÈÈX
X
X
t
v
v
v
=³
¿ËXr#éX
ÈX
X
X
ét
jjÈÈt
t
t
X
j ÈÈt
P@îIÃŒŠjjjjX
t
t
t
CryptoToken [
(timeStamp, generalIDa, password)Hash
]
CryptoToken [
(timeStamp, generalIDb, password)Hash
]
(
, generalIDa,
) [Not Authenticated]
EPA
EPB
(
, generalIDb,
) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©z#ª20( )¡;ÿÿÿÿÿÿ2û/(`'Kÿÿÿÿÿÿ2
0(;¯#<ÿÿÿÿ2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ0þ/&ž$
Dÿ/: 5q$cUÿÿÿ T*b*00&év&
D0:«M&bTÿÿÿ aS)aS)00&žô(
D0: 5Ê(cUÿÿÿ T*b*00&ù·*
D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ23FJno¬®žÆÇáâãöùòêòäòêòäÝäÖäÝäÔu
U]abc
]abch]abcU]abch
U]abcuDaGHIJ¬®²³·žàáâãþS&ðþ£Øþ£Øþ£ØþþØþþúØþúðþþÔÀþþÃÀþþòØþþþS&ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font;u€©ÒÕã ãÿÿÿÿ ÿÿãöã
ãú,^Âô$hÜPÄ)3äÿ@\\BAHARI\JF3-2-D13-4SINe00:winspool\\BAHARI\JF3-2-D13-4SI\\BAHARI\JF3-2-D13-4SIpSLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\\BAHARI\JF3-2-D13-4SIpSLettermic8Ä ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐhKMf!#
James TogajtogaätJames Togaÿipt NormaldjtogaTo2ExMicrosoft Word for Windows 95@FÃ#@@êaIÃŒ@vèäIÃŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.Ole
ÿÿÿÿÿÿÿÿÿÿÿÿØPIC
$&ÿÿÿÿÙLMETAÿÿÿÿÿÿÿÿÿÿÿÿÛ<CompObj%)ÿÿÿÿhLCÆ
V&ÏppCÆ
A&ÿÿÿÿWordMicrosoft WordAù
û-ûÿTimes New Roman4- \ÌûœÿŒ"Arial-2
ÌùAEPA---
þÿÿÿ
þÿÿÿþÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@þÿÿÿBCDEFGþÿÿÿIJKþÿÿÿþÿÿÿNþÿÿÿþÿÿÿQþÿÿÿþÿÿÿTUþÿÿÿþÿÿÿþÿÿÿYþÿÿÿþÿÿÿ\þÿÿÿþÿÿÿ_`þÿÿÿþÿÿÿþÿÿÿdþÿÿÿfþÿÿÿþÿÿÿijklmnþÿÿÿpqrþÿÿÿþÿÿÿuþÿÿÿwxyz{|}~'ÿÿc·
û-2
ûùAEPB--0'ÿÿg®ÜA-
2
ÚAùA ûµÿŒ"Arial-@2
ÞV#ùACryptoToken [
(timeStamp, generalID6&....**.KC*2*C..*.**6ûÎÿŒ"ArialNe-
2
ý¶ùAb-.2
ÞÕùA ,{timeStamp, generalIDC*2*C..*.**6-
2
ýùAb-2
Þ=ùA}Sign2..-
2
ýýùAa-2
ÞùA), ûµÿŒ"ArialT-2
à\ùA(Certificate6****-2
Þå
ùA)
]Kûµÿ"ArialNe--'ÿÿ ú"-x>xW ú"-ðü- úÿÿÿ"- $IOyIgry-ð üÿÿÿ- ð ú"->R>l-ðü- úÿÿÿ"-
$a-[?aP8?-ð
- ð ú"-H>HW-ð ú"-Ys-ðü- úÿÿÿ"-
$hóbh?-ð
- ð®A-A2
A$ùA CryptoToken [
(timeStamp, generalID6&....**.KC*2*C..*.**6-
2
±¶ùAa-.2
ÒùA ,{timeStamp, generalIDC*2*C..*.**6-
2
±ùAa-2
7ùA}Sign2..-
2
±÷ùAb-2
ùA), -2
Y
ùA(Certificate)6****-2
ú
ùA
]K--'ÿÿ8ÁÙ- 2
ÛùA(
, generalIDK*****6ûÎÿ"Arialr -
2
øùAb-/2
Û"ùA,
) [Not Authenticated]K6*2****&***'ÿÿsrö- 2
öùA(
, generalIDK*****6-
2
+àùAa-/2
üùA,
) [Not Authenticated]K6*2****&***-'ÿÿ-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿCÆ
4 A&ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000(+ÿÿÿÿ\WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿæ"SummaryInformation(*,ÿÿÿÿAŒÿÿÿÿWordMicrosoft WordAù
û-ûÿTimes New Roman4- \ÌûœÿŒ"Arial-2
ÌùAEPA---'ÿÿc·
û-2
ûùAEPB--0'ÿÿg®ÜA-
2
ÚAùA ûµÿŒ"Arial-@2
ÞV#ùACryptoToken [
(timeStamp, generalID6&....**.KC*2*C..*.**6ûÎÿŒ"ArialNe-
2
ý¶ùAb-.2
ÞÕùA ,{timeStamp, generalIDC*2*C..*.**6-
2
ýùAb-2
Þ=ùA}Sign2..-
2
ýýùAa-2
ÞùA), ûµÿŒ"ArialT-2
à\ùA(Certificate6****-2
Þå
ùA)
]Kûµÿ"ArialNe--'ÿÿ ú"-x>xW ú"-ðü- úÿÿÿ"- $IOyIgry-ð üÿÿÿ- ð ú"->R>l-ðü- úÿÿÿ"-
$a-[?aP8?-ð
- ð ú"-H>HW-ð ú"-Ys-ðü- úÿÿÿ"-
$hóbh?-ð
- ð®A-A2
A$ùA CryptoToken [
(timeStamp, generalID6&....**.KC*2*C..*.**6-
2
±¶ùAa-.2
ÒùA ,{timeStamp, generalIDC*2*C..*.**6-
2
±ùAa-2
7ùA}Sign2..-
2
±÷ùAb-2
ùA), -2
Y
ùA(Certificate)6****-2
ú
ùA
]K--'ÿÿ8ÁÙ- 2
ÛùA(
, generalIDK*****6ûÎÿ"Arialr -
2
øùAb-/2
Û"ùA,
) [Not Authenticated]K6*2****&***'ÿÿsrö- 2
öùA(
, generalIDK*****6-
2
+àùAa-/2
üùA,
) [Not Authenticated]K6*2****&***-'ÿÿ-þÿà
òùOh«+'³Ù0 ¬žÌØäô
<HT
`lt|äçAdJames Toga,FNormal Jim Toga-D2IMicrosoft Word for Windows 95@FÃ#@@ìóLÉŒ@ZìjɌܥhWà e"
jjjjŽŽŽŽŽŽ
Ÿ
Žs1ÈÈÈÈÈN
N
N
j
l
l
l
Qœ
L LU€Xü&sN
ÈN
N
N
sj
jjÈÈj
j
j
N
j ÈÈj
E|ÉŒŠjjjjN
j
j
j
CryptoToken [
(timeStamp, generalIDa ,{timeStamp, generalIDa}Signb), (Certificate)
]
CryptoToken [
(timeStamp, generalIDb ,{timeStamp, generalIDb}Signa), (Certificate)
]
(
, generalIDa,
) [Not Authenticated]
EPA
EPB
(
, generalIDb,
) [Not Authenticated]
€ÀN¥ÀNŠV§šz#©z#ª20(À )Ñ;ÿÿÿÿÿÿ2û/(Àð'ÑKÿÿÿÿÿÿ2
0(,#µÿÿÿÿ2ò/(A#ÒÓÿÿÿÿÿÿ2ó/(K7#ÃÓÿÿÿÿÿÿ0þ/&ž$
Dÿ/: 5q$cUÿÿÿ T*b*00&év&
D0:«M&bTÿÿÿ aS)aS)00&žô(
00&ù·*
D0:»*cUÿÿÿ bS*bT*20(%ñâÿÿÿÿÿÿ
23JKPQTacfg¢£š©¬ž»ŒœÌÍåçñÿëùòêòêòêòâòÜÚòêòêòêòâòÜÚÜÓÜÌÜÓÜÊu
U]abc
]abcha]abcUV]abcU]abch
U]abcuDa#defŒœŸæçëìðñþS&ëþÒØþÒÌþþÒØþÒëþþÌþþÔÀþþÃÀþþòÌþþþS&ëK@ñÿNormala "A@òÿ¡"Default Paragraph FontX°ÙÞã ÿÿÿÿ ÿÿë
3eÉû-]¡ÑEu¹Tcÿ@HP LaserJet 4/4M Plus PS\\Bahari\jf3-2-d13-4siPSCRIPTHP LaserJet 4/4M Plus PSHP LaserJet 4/4M Plus PSžwê
odXXÀÈW¹)x!€ÀëlÐMRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBHP LaserJet 4/4M Plus PSžwê
odXXÀÈW¹)x!€ÀëlÐMRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BB1Times New RomanSymbol&Arial"ÁÐhrijÂf!&
James TogaJim TogaDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿHØ_947279111ÿÿÿÿÿÿÿÿ1dOÏꪹ)èÀÔ"Kç)œ@øeKç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿLPIC
.0ÿÿÿÿMLþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel,L²œøu
èè Microsoft (R) PowerPoint (R) Windows ð_ÀãMETAÿÿÿÿÿÿÿÿÿÿÿÿôHeader/5ÿÿÿÿO9CompObjÿÿÿÿÿÿÿÿÿÿÿÿPuObjInfo24ÿÿÿÿR²œ Æ (&ÿÿÿÿeüÿÿLýÿÿ® &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±T
&
TNPPð &ÿÿÿÿ&TNPPLýeüb0 úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ
¶LýeüûÜÿTimes New Roman)-.
ûÜÿTimes New Roman1-ð.
&ÿÿÿÿ ú"--þ©ýzý£üûÂÿTimes New Roman)-ð.
2
ÖýÁüCODEC)-,&) &ÿÿÿÿ÷ý &ÿÿÿÿü²²²-ð ²²²|çý>[ýûÂÿTimes New Roman1-ð.
Ò¶
2
lkýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²þAøýûÂÿTimes New Roman)-ð.
Ò¶
2
pþabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}ÿAòþûÂÿTimes New Roman1-ð.
Ò¶
2
pÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²ÆB:ûÂÿTimes New Roman)-ð.
Ò¶
2
pJabcd &ÿÿÿÿûÂÿTimes New Roman1-ð.
Ò¶(2
þTransport Segmentation%#0 &ÿÿÿÿ ²²²$ýþÿµýÿýÿý3þfý3þfýÿLýÿûÂÿTimes New Roman)-ð.
ÄÒ2
ÿýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿüÿÿÿ-ð ÿÿÿ_ÿùþ*ûÂÿTimes New Roman1-ð.
°ÿ2
8ÿIKey #1- &ÿÿÿÿ &ÿÿÿÿü²²²-ð ²²²É0ŸûÂÿTimes New Roman)-ð.
Òÿ2
{ì
Encryption% &ÿÿÿÿ-$bNb\\{b{b®l$âÿ³Œÿ©Œÿ©xÿxÿŒÿŒÿ &ÿÿÿÿü-ð $|ØAÚCb~`- $Ô4Ö6omûÂÿ
Times New Roman1-ð.
Òÿ
2
çPabcd &ÿÿÿÿ &ÿÿÿÿ- $|AC~ - $}46ûÂÿ
Times New Roman)-ð.
ðÿ
2
Pabcd &ÿÿÿÿ--Þ÷qý &ÿÿÿÿ- Îçý[ý- Üóý}XýûÂÿTimes New Roman1-ð.
ðÿ
2
Ÿkýabcd &ÿÿÿÿ &ÿÿÿÿ- Οþ3þ- ÜËþ}/þûÂÿTimes New Roman)-ð.
Òÿ
2
ŸBþabcd &ÿÿÿÿ &ÿÿÿÿ- ÎŽÿ)ÿ- ÜÁÿ}%ÿûÂÿTimes New Roman1-ð.
Òÿ
2
Ÿ8ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Î- ܧ}ûÂÿTimes New Roman)-ð.
Òÿ
2
Ÿabcd &ÿÿÿÿ--$D®ÌœÜœÜü²²²-ð ²²²Ú`ý}1ý ²²²Þ7þþ ²²²Ý&ÿ÷þ ²²²Ø{âÿûÂÿTimes New Roman1-ð.
Òÿ2
aAþ
SDU Header"-,--úþªþ)ûÂÿTimes New Roman)-ð.
ÄÒ2
åþEKey #2-ûÂÿTimes New Roman1-ð.
ÄÒ'2
+þiKeys as passed in the-ûÂÿTimes New Roman)-ð.
ÄÒ2
uþi
H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðþÿ
ÿÿÿÿdOÏꪹ)èMicrosoft PowerPoint SlideMSPresentationPowerPoint.Slide.7ô9²qCODEC
abcd
abcd
abcd
abcd
Transport Segmentation
abcdabcdabcd
Key #1
Encryption
abcd
abcd
abcd
abcd
abcd
abcd
SDU Header
Key #2
Keys as passed in the
H.245 channel
ÆPowerPoint DocumentOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿŽText_Content37ÿÿÿÿS¶SummaryInformation(ÿÿÿÿÿÿÿÿÿÿÿÿšPowerPoint Document(68ÿÿÿÿeýÿÿÿ
þÿÿÿ
þÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHþÿÿÿRKLMNOPQþÿÿÿ^iUVWXYZ[\]þÿÿÿu`abcdefghþÿÿÿÜklmnopqrstþÿÿÿ²ýÿÿÿxyz{|}~ÿÿÿÿÿÿÿÿ²œ Æ (&ÿÿÿÿeüÿÿLýÿÿ® &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±T
&
TNPPð &ÿÿÿÿ&TNPPLýeüb0 úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ
¶LýeüûÜÿTimes New Roman)-.
ûÜÿTimes New Roman1-ð.
&ÿÿÿÿ ú"--þ©ýzý£üûÂÿTimes New Roman)-ð.
2
ÖýÁüCODEC)-,&) &ÿÿÿÿ÷ý &ÿÿÿÿü²²²-ð ²²²|çý>[ýûÂÿTimes New Roman1-ð.
Ò¶
2
lkýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²þAøýûÂÿTimes New Roman)-ð.
Ò¶
2
pþabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}ÿAòþûÂÿTimes New Roman1-ð.
Ò¶
2
pÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²ÆB:ûÂÿTimes New Roman)-ð.
Ò¶
2
pJabcd &ÿÿÿÿûÂÿTimes New Roman1-ð.
Ò¶(2
þTransport Segmentation%#0 &ÿÿÿÿ ²²²$ýþÿµýÿýÿý3þfý3þfýÿLýÿûÂÿTimes New Roman)-ð.
ÄÒ2
ÿýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿüÿÿÿ-ð ÿÿÿ_ÿùþ*ûÂÿTimes New Roman1-ð.
°ÿ2
8ÿIKey #1- &ÿÿÿÿ &ÿÿÿÿü²²²-ð ²²²É0ŸûÂÿTimes New Roman)-ð.
Òÿ2
{ì
Encryption% &ÿÿÿÿ-$bNb\\{b{b®l$âÿ³Œÿ©Œÿ©xÿxÿŒÿŒÿ &ÿÿÿÿü-ð $|ØAÚCb~`- $Ô4Ö6omûÂÿ
Times New Roman1-ð.
Òÿ
2
çPabcd &ÿÿÿÿ &ÿÿÿÿ- $|AC~ - $}46ûÂÿ
Times New Roman)-ð.
ðÿ
2
Pabcd &ÿÿÿÿ--Þ÷qý &ÿÿÿÿ- Îçý[ý- Üóý}XýûÂÿTimes New Roman1-ð.
ðÿ
2
Ÿkýabcd &ÿÿÿÿ &ÿÿÿÿ- Οþ3þ- ÜËþ}/þûÂÿTimes New Roman)-ð.
Òÿ
2
ŸBþabcd &ÿÿÿÿ &ÿÿÿÿ- ÎŽÿ)ÿ- ÜÁÿ}%ÿûÂÿTimes New Roman1-ð.
Òÿ
2
Ÿ8ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Î- ܧ}ûÂÿTimes New Roman)-ð.
Òÿ
2
Ÿabcd &ÿÿÿÿ--$D®ÌœÜœÜü²²²-ð ²²²Ú`ý}1ý ²²²Þ7þþ ²²²Ý&ÿ÷þ ²²²Ø{âÿûÂÿTimes New Roman1-ð.
Òÿ2
aAþ
SDU Header"-,--úþªþ)ûÂÿTimes New Roman)-ð.
ÄÒ2
åþEKey #2-ûÂÿTimes New Roman1-ð.
ÄÒ'2
+þiKeys as passed in the-ûÂÿTimes New Roman)-ð.
ÄÒ2
uþi
H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðþÿà
òùOh«+'³Ù0x`h šŽ
Ôà
ìøäNo Slide TitleJames TogaJames Toga7Microsoft PowerPoint@yþ@@GUÖÔØ»@ ±?å»Gnÿÿÿÿ1% ¯ (&ÿÿÿÿ`úÿÿÈûÿÿ2 &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±
&
TNPPð &ÿÿÿÿ&TNPPÈû`új: úÿÿÿ"-üÿÿÿ- ÿÿÿ
:¢Èû`úûÈÿTimes New Roman)-.
ûÈÿTimes New Roman1-ð.
&ÿÿÿÿ ú"-ü-ýYüüÀúû ÿTimes New Roman)-ð.
2
üðúCODEC@FE;@ &ÿÿÿÿÙ0hû &ÿÿÿÿü²²²- ²²²Á¹ü`àûû ÿTimes New Roman1-ð.
XÀžo
2
šøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²ÇýfÔüû ÿTimes New Roman)-ð.
XÀžo
2
®ìüabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Ç3ÿfZþû ÿTimes New Roman1-ð.
XÀžo
2
®rþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²È4g[û ÿTimes New Roman)-ð.
XÀžo
2
¯sabcd+0*0 &ÿÿÿÿû ÿTimes New Roman1-ð.
XÀžo(2
ýTransport Segmentation; *0&00 6*0K+0+00 &ÿÿÿÿ ²²²$üÿÿoüBÿFüBÿFü2ýóû2ýóûBÿÊûBÿû ÿTimes New Roman)-ð.
À+2
Yÿ9üabcdabcdabcd+0*0+0+0*0+0 &ÿÿÿÿ &ÿÿÿÿ-ð ÿÿÿÿÉfþ`û ÿTimes New Roman1-ð.
°ÿ2
ÈþKey #1F*000 &ÿÿÿÿ &ÿÿÿÿü²²²- ²²²9ù0žû ÿTimes New Roman)-ð.
XÀÿ2
À
Encryption;0+0000 &ÿÿÿÿ-$)z)²²À)À)ש$Ñÿ7ÿ&ÿ&,ÿ,ÿÿòÿ &ÿÿÿÿü-ð $âRT(æ&- $KpMt<:û ÿ
Times New Roman1-ð.
XÀÿ
2
iabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- $âZ\0æ.- $SpUtDBû ÿ
Times New Roman)-ð.
ðÿ
2
qabcd+0*0 &ÿÿÿÿ--é@hû &ÿÿÿÿ- ѹüpàû- åÌüSÛûû ÿTimes New Roman1-ð.
ðÿ
2
žøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñ þp0ý- åþS+ýû ÿTimes New Roman)-ð.
XÀÿ
2
žHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñÿp°þ- åÿS«þû ÿTimes New Roman1-ð.
XÀÿ
2
žÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ññp- åSû ÿTimes New Roman)-ð.
XÀÿ
2
ž0abcd+0*0 &ÿÿÿÿ--$ú¡qÏqžçžçqqrü²²²- ²²²äçûSû ²²²é7ýXîü ²²²è«þWbþ ²²²áPÑÿû ÿTimes New Roman1-ð.
XÀÿ2
'Fý
SDU Header6EEF*+0* -fþÐëý`û ÿTimes New Roman)-ð.
À+2
GþKey #2F*000û ÿTimes New Roman1-ð.
À+'2
$ý3Keys as passed in theF*0&*&0*%&*000*û ÿTimes New Roman)-ð.
À+2
ý3
H.245 channelF000*0+00*&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðÿÿódèÿÿãdé,ààØb) PØöòÿÿ:ëÿÿfØáØáØáÈÿÿ4Ò(ºÿÿºÿÿÖÿÿ âá°ÿÿåÿÿT ³4ØÔ Ð@ð`@æËáåÿÿT ³4 @@``@æËáåÿÿT ³4Ð@ð`0 @æËáÕÿÿø¶ÿÿL ·<Times New RomanÊá¶ÿÿL ·<"ArialÊáÕÿÿï$äÿÿ)ÿÿB*
ÝÔØè, ,÷¿,÷¿,^,Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØè ÷¿÷¿^Pÿÿÿddþÿÿÿ×ddþÿÿÿVddþÿÿÿÈddþÿÿÿddþÿÿÿ×ÿÿÿÔØ
è ÷¿÷¿^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÔØÿÿÿÿèÿÿÿ ÿÿÿ÷¿ÿÿÿ÷¿ÿÿÿ^ÿÿÿPÿÿÿÿÿÿ×ÿÿÿVÿÿÿÈÿÿÿÿÿÿ×ÿÿÿÄÿÿÅÁ(ýÿÿÿýÿÿÿœ8ÿ00¡ÿÿt :À'PÔb¢ÿÿD£$ÿÿµàÿÿìã42Öýÿÿddâ3î5ìÿÿ/î/ìÿÿ0î0ìÿÿ1î1Ðÿÿ;
Ñîÿÿê:ïíÀôÿÿ÷ÿÿ@p÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿR9¹ÿÿíºÙPžÿÿÉÀÿÿÁ(ýÿÿÿõÿÿ øÿÿ°øÿÿúÿÿýÿÿÿœ8ÿÿ00ÖbÀÿÿ)Á(ýÿÿÿŠõÿÿvøÿÿ¥øÿÿùÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿi£$@ùÿÿàõÿÿøÿÿkøÿÿyùÿÿµàÿÿî5CODECìÿÿ</î,/â|ìbìÿÿX0îH0ã4|ìýÿÿddìÿÿ(1î1á|ìÿÿÿÿÀÿÿÁ(ýÿÿÿ$Ðöÿÿ`°ýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿÀpùÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿùÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Pð÷ÿÿ£Zùÿÿµàÿÿî5abcdìÿÿ</î,/â #bìÿÿX0îH0ã4 #ýÿÿddìÿÿ(1î1á #ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿšùÿÿÌXûÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿùÿÿ|ûÿÿ²ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$\Øùÿÿ¯Bûÿÿµàÿÿî5abcdìÿÿ</î,/âl/bìÿÿX0îH0ã4l/ýÿÿddìÿÿ(1î1ál/ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿµüÿÿÌeþÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ«üÿÿþÿÿ²ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Q\åüÿÿ¯Oþÿÿµàÿÿî5abcdìÿÿ</î,/â8;bìÿÿX0îH0ã48;ýÿÿddìÿÿ(1î1á8;ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ¶Ífýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¬³ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$Q]æ°Pµàÿÿî5abcdìÿÿ</î,/âGbìÿÿX0îH0ã4Gýÿÿddìÿÿ(1î1áGÿÿÿÿÀÿÿ:Á(ýÿÿÿ$Æùÿÿfÿÿÿtýÿÿÿœ8ÿÿÿ00 P¡ÿÿª :Ñ'PÔb¢ÿÿz£$Q0úÿÿÿÿÿ:iµàÿÿ"î5Transport Segmentationìÿÿ</î,/â?bìÿÿX0îH0ã4?ýÿÿddìÿÿ(1î1á?ÿÿÿÿ¹ÿÿôºÙPžÿÿÐÀÿÿÁ( p>÷ÿÿ`úÿÿàøÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ0Á(ýÿÿÿÕõÿÿüÿÿúÿÿ$ýÿÿ°ýÿÿÿœ8ÿÿÿ00Öb°¡ÿÿ :Ñ'PÔb¢ÿÿp£$QÎüÿÿ°öÿÿ!üÿÿNúÿÿýÿÿµàÿÿî5abcdabcdabcdìÿÿ</î,/âÐRbìÿÿX0îH0ã4ÐRýÿÿddìÿÿ(1î1áÐRÿÿÿÿ¹ÿÿºÙPžÿÿúÀÿÿÁ(ýÿÿÿÀÌüÿÿ þÿÿýÿÿÿœ8ÿ00ÖbÀÿÿZÁ(ýÿÿÿæÆüÿÿ æýÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿÊ :Ñ'PÔb¢ÿÿ£$Qýÿÿ ãüÿÿP Éýÿÿµ×8ýÿÿàÿÿ*î5Key #1ìÿÿ</î,/â€^bìÿÿX0îH0ã4€^ýÿÿddìÿÿ@1î01á€^ÿÿÿÿá€^ÿÿÿÿ¹ÿÿòºÙPžÿÿÎÀÿÿÁ(ýÿÿÿp`ð pýÿÿÿœ8ÿ00ÖbÀÿÿ.Á(ýÿÿÿƶ Öýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿn£$QÓU ¹µàÿÿî
5Encryptionìÿÿ</î,/
âŽjbìÿÿX0îH0
ã4Žjýÿÿddìÿÿ(1î1
áŽjÿÿÿÿÀÿÿÁ( 0*$`ð@°ýÿÿÿœ8ÿÿ00 PÀÿÿÁ( p+6$àUþÿÿp¥ÿÿÿýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿCÙpúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿödpúÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÀpúÿÿÀ*ùµàÿÿî5abcdìÿÿ</î,/âvbìÿÿX0îH0ã4výÿÿddìÿÿ(1î1ávÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ)Cépúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿd&púÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÐpúÿÿÀ#* µàÿÿî5abcdìÿÿ</î,/âTbìÿÿX0îH0ã4Týÿÿddìÿÿ(1î1áTÿÿÿÿÀÿÿÁ(ýÿÿÿ$ÐöÿÿÐýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿàpùÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿŠùÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pð÷ÿÿÃZùÿÿ©µàÿÿî5abcdìÿÿ</î,/â bìÿÿX0îH0ã4 ýÿÿddìÿÿ(1î1á ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`úÿÿàüÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVúÿÿŠ4üÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$púÿÿÃúûÿÿ©µàÿÿî5abcdìÿÿ</î,/âìbìÿÿX0îH0ã4ìýÿÿddìÿÿ(1î1áìÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿàÿÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿŠ4ÿÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pýÿÿÃúþÿÿ©µàÿÿî5abcdìÿÿ</î,/➥bìÿÿX0îH0ã4ž¥ýÿÿddìÿÿ(1î1ឥÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ0àà ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ&ŠÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$p`ÃÊ©µàÿÿî5abcdìÿÿ</î,/â±bìÿÿX0îH0ã4±ýÿÿddìÿÿ(1î1á±ÿÿÿÿÀÿÿÁ( @0*$ðàÐ ýÿÿÿœ8ÿÿ00 PÀôÿÿÀÿÿÁ(ýÿÿÿ$<÷ÿÿ¥Ì÷ÿÿÅýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$Üùÿÿ¯lúÿÿÏýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$ÅüÿÿUýÿÿÍýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ$¢ÿÿÿ2¿ýÿÿÿœ8ÿ00 PÀÿÿ^Á(ýÿÿÿ$Rúÿÿ þÿÿ€ýÿÿÿœ8ÿÿÿ00 P¡ÿÿÎ :Ñ'PÔb¢ÿÿ£$ÑNúÿÿ¡fþÿÿµ×úÿÿVàÿÿ.î
5SDU Headerìÿÿ</î,/
‬bìÿÿX0îH0
ã4€¬ýÿÿddìÿÿ@1î01ာÿÿÿÿာÿÿÿÿÀÿÿÁ(ýÿÿÿ$¿Öûÿÿ Ëüÿÿýÿÿÿœ8ÿÿ00 PÀÿÿ*Á(ýÿÿÿ$ÚÄûÿÿ~ äüÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿj£$ÑüÿÿáûÿÿD Çüÿÿµàÿÿî5Key #2ìÿÿ</î,/âðµbìÿÿX0îH0ã4ðµýÿÿddìÿÿ(1î1áðµÿÿÿÿÀÿÿ§Á(ýÿÿÿ$+ùÿÿ
ûÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿç£$ÑIúÿÿeùÿÿÏ
hûÿÿµ×mQúÿÿàÿÿwî#5Keys as passed in the
H.245 channelìÿÿ</î,/#âòbìÿÿ 0î0ã4òýÿÿdd
ã4òýÿÿddìÿÿ(1î1#áòÿÿÿÿÐÿÿÍÑøÿÿ©ïíÀôÿÿ÷ÿÿ@p×bï$7ÿÿÿÌ33ÌÌÌÿ²²²ï$7ÿÿÿÿÿÿÿÿÿÿ3ï$7ÿÿÌ3333ÌÿÌfï$7ÿÿÿ999ËËËMMMêêêï$7ÿÿÿÿÌfÿÌÌÀÀÀï$7ÿÿÿËËËfÿÿ3ï$7ÿÿÿ3ÿÿÌÌ̲²²÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿ
Âÿÿ\ÃbÁ(ýÿÿÿ Ppöÿÿùÿÿ àûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿŽ :Ä'PÔbäÿÿ£$Äÿÿªöÿÿ-ùÿÿV Ãûÿÿµàÿÿ,î 5Click to edit Master title styleìÿÿ</î,/ â¿,bìÿÿX0îH0 ã4¿ýÿÿddìÿÿ(1î1 á¿ÿÿÿÿÂÿÿ2ÃbÁ(ýÿÿÿ Ppöÿÿpüÿÿ ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ä'PÔbäÿÿZ£$ÄÿÿªöÿÿüÿÿV sµàÿÿîR5Click to edit Master text styles
Second level
Third level
Fourth level
Fifth levelìÿÿÀ/î°/!â€Ã b
â€Ãbâ€Ãbâ€Ãbìÿÿx0îh0!ã4€Ãýÿÿdd
ã4€Ãýÿÿddã4€Ãýÿÿdd
ã4€Ãýÿÿddã4€Ãýÿÿddìÿÿ(1î1Rá€ÃÿÿÿÿÂÿÿ=ÃbÁ(ýÿÿÿ Ppöÿÿð ûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªöÿÿ
æúÿÿóµàÿÿ
î5*ìÿÿ</î,/âhÉbìÿÿX0îH0ã4hÉýÿÿddìÿÿ(1î1áhÉÂÿÿ=ÃbÁ(ýÿÿÿ Ppüÿÿðýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªüÿÿ
Vóµàÿÿ
î5*ìÿÿ</î,/âhÍbìÿÿX0îH0ã4hÍýÿÿddìÿÿ(1î1áhÍÂÿÿ=ÃbÁ(ýÿÿÿ Pàð ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿ
V óµàÿÿ
î5*ìÿÿ</î,/âPæbìÿÿX0îH0ã4Pæýÿÿddìÿÿ(1î1áPæºÿÿÐÿÿÑÿÿÿDºÿÿ_VBA_PROJECTºÿÿ úÿÿŽþêÿÿ0ûûý4 d deded>pdüÿÿHýÿÿÿÿ$dãÿÿeé,êDocumentSummaryInformation8ÿÿÿÿ9ÿÿÿÿJPersistentStorage Directory8ÿÿÿÿÿÿÿÿÿÿÿÿV>_947279112-Q>dOÏꪹ)èàèKç)œ z¡Kç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿWþÿÕÍÕ.+,ù®0d`h š°
žäOn-screen ShowódArialTimes New RomanDefault DesignNo Slide TitleFonts UsedDesign Template
Slide TitlesÿÿÿÿÿÿÿÿyJ@tu)g
óH103:35 PM 3/14/96 -0500Majordomo(a)concours.ctron.comMajordomo resultsÿÿÿÿÿÿÿÿzJ\sÜ6óH103:35 PM 3/14/96 -0500Majordomo(a)concours.ctron.comWelcome to cogÿÿÿÿÿÿÿÿyJ\sóAb ©J109:51 AM 3/15/96 -0800Carl MetlerNew member app requestsÿÿÿÿÿÿÿÿWKkUKWëS104:06 PM 3/22/96 ESTFrank Georgere:Re: O ringÿÿÿÿÿÿÿÿÆD¬Vœ¹Z102:06 AM 3/28/96 -0600James R. DavisInvitation to safety oriented pageÿÿÿÿÿÿÿÿÍYibN
§©`108:14 PM 4/1/96 +0000Perry ColemanRE: Kawasaki homepageÿÿÿÿÿÿÿÿ?TÝ·lQ~±a110:00 AM 4/2/96 -0500I Can't Wait To See What Happens NextBun Cooler and ShaftÿÿÿÿÿÿÿÿâæŒA{poc105:43 PM 4/3/96 -0500I Can't Wait To See What Happens NextSeatsÿÿÿÿÿÿÿÿŸæ+Yxªr108:59 AM 4/15/96 -0400Matthew E. StollerRe: Robert/relayÿÿÿÿÿÿÿÿçZ+ ñk110:11 PM 4/24/96 -0700David NealNeophyte Software Map Review?ÿÿÿÿÿÿÿÿ3Ä¥B
108:17 AM 5/2/96 EDTBob Shriner\\VATales from the COG Past . . .ÿÿÿÿÿÿÿÿ÷€ßGŠŒ< 9º110:26 PM 5/8/96 -0400MJNessler(a)aol.comRe: radar accuracyÿÿÿÿÿÿÿÿZ'
âÅ?~112:48 AM 5/11/96 -0400MJNessler(a)aol.comPolice RADAR, Pt. 2ÿÿÿÿÿÿÿÿT]nñÄ
Ѳ111:08 AM 5/13/96 -0400Jim BeckRe: Suches Trip resultsÿÿÿÿÿÿÿÿÄhµÃ
î107:00 PM 5/15/96 -0700Rick HallRe: Long Road Tripsÿÿÿÿÿÿÿÿ]¥Úsxø¬Š106:47 PM 5/24/96 -0500pfennig(a)fwb.gulf.netRe: screwsÿÿÿÿÿÿÿÿåö=I(©ðª110:24 PM 5/27/96 -0700Carl MetlerRidePIC
;=ÿÿÿÿXLMETAÿÿÿÿÿÿÿÿÿÿÿÿTHeader<BÿÿÿÿZ9CompObjÿÿÿÿÿÿÿÿÿÿÿÿ[uL ú%
èè Microsoft (R) PowerPoint (R) Windows ð_Àãþÿ
ÿÿÿÿdOÏꪹ)èMicrosoft PowerPoint SlideMSPresentationPowerPoint.Slide.7ô9²qCODEC
abcd
abcd
abcd
abcd
Transport De-Segmentation
abcdabcdabcd
Decryption
abcd
abcd
abcd
abcd
abcd
abcd
SDU Head ú ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢
&
TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ
œŠEý\üûÜÿTimes New Roman4-.
ûÜÿTimes New Roman%-ð.
&ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð.
2
Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð.
Ò
2
m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð.
Ò
2
m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð.
Ò
2
m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð.
Ò
2
m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð.
Ò-2
þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ
Times New Roman4-ð.
ÄÒ2
þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð.
ðÿ2
|ñ
Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ
Times New Roman4-ð.
Òÿ
2
éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ
Times New Roman%-ð.
ðÿ
2
Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð.
ðÿ
2
Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð.
Òÿ
2
Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð.
Òÿ
2
Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð.
Òÿ
2
Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð.
Òÿ2
e<þ
SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð.
ÄÒ2
6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð.
Ò°¡2
ãþJKey #2- ûÂÿTimes New Roman%-ð.
ÄÒ-*2
'þlKeys as received in the- ûÂÿTimes New Roman4-ð.
ÄÒ-2
qþl
H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðObjInfo?Aÿÿÿÿ]OlePres000ÿÿÿÿÿÿÿÿÿÿÿÿ_šText_Content@Dÿÿÿÿ^»SummaryInformation(ÿÿÿÿÿÿÿÿÿÿÿÿjÿÿÿÿÿÿÿÿ ú ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢
&
TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ
œŠEý\üûÜÿTimes New Roman4-.
ûÜÿTimes New Roman%-ð.
&ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð.
2
Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð.
Ò
2
m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð.
Ò
2
m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð.
Ò
2
m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð.
Ò
2
m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð.
Ò-2
þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ
Times New Roman4-ð.
ÄÒ2
þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð.
ðÿ2
|ñ
Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ
Times New Roman4-ð.
Òÿ
2
éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ
Times New Roman%-ð.
ðÿ
2
Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð.
ðÿ
2
Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð.
Òÿ
2
Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð.
Òÿ
2
Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð.
Òÿ
2
Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð.
Òÿ2
e<þ
SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð.
ÄÒ2
6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð.
Ò°¡2
ãþJKey #2- ûÂÿTimes New Roman%-ð.
ÄÒ-*2
'þlKeys as received in the- ûÂÿTimes New Roman4-ð.
ÄÒ-2
qþl
H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðer
Key #1
Key #2
Keys as received in the
H.245 channel
ÆPowerPoint DocumentLw;f*¶! èèàþÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qþÿà
òùOh«+'³Ù0h`h šŽ
Ôà
ìøäNo Slide TitleJames TogaJames Toga5Microsoft PowerPoint@`ž)@@GUÖÔØ»@`R?å»G`ÿÿÿÿ1% š -&ÿÿÿÿ`úÿÿÈûÿÿ2 &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±
&
TNPPð &ÿÿÿÿ&TNPPÈû`új: úÿÿÿ"-üÿÿÿ- ÿÿÿ
:¢Èû`úûÈÿTimes New Roman4-.
ûÈÿTimes New Roman%-ð.
&ÿÿÿÿ ú"-ü-ýYüüÀúû ÿTimes New Roman4-ð.
2
üðúCODEC@FE;@ &ÿÿÿÿÙ0hû &ÿÿÿÿü²²²- ²²²Áý`@üû ÿTimes New Roman%-ð.
XÀ8-
2
šXüabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Áþ`0ýû ÿTimes New Roman4-ð.
XÀ8-
2
šHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²Áÿ`°þû ÿTimes New Roman%-ð.
XÀ8-
2
šÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ ²²²ÁQ`xû ÿTimes New Roman4-ð.
XÀ8-
2
šabcd+0*0 &ÿÿÿÿû ÿTimes New Roman%-ð.
XÀ8--2
ýTransport De-Segmentation; *0&00 F* 6*0K+0+00 &ÿÿÿÿ ²²²$ÈûÛýòûÛýòûëÿEüëÿEüÛýnüÛýüýû ÿ
Times New Roman4-ð.
À+2
Ãýÿûabcdabcdabcd+0*0+0+0*0+0 &ÿÿÿÿ &ÿÿÿÿ ²²²9ù0žû ÿTimes New Roman%-ð.
ðÿ2
À
DecryptionF*+ 0000 &ÿÿÿÿ-$²©)×)ÀÀ))z &ÿÿÿÿü-ð $âRT(æ&- $KpMt<:û ÿ
Times New Roman4-ð.
XÀÿ
2
iabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- $âZ\0æ.- $SpUtDBû ÿ
Times New Roman%-ð.
ðÿ
2
qabcd+0*0 &ÿÿÿÿ--é@hû &ÿÿÿÿ- ѹüpàû- åÌüSÛûû ÿTimes New Roman4-ð.
ðÿ
2
žøûabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñ þp0ý- åþS+ýû ÿTimes New Roman%-ð.
XÀÿ
2
žHýabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ñÿp°þ- åÿS«þû ÿTimes New Roman4-ð.
XÀÿ
2
žÈþabcd+0*0 &ÿÿÿÿ &ÿÿÿÿ- Ññp- åSû ÿTimes New Roman%-ð.
XÀÿ
2
ž0abcd+0*0 &ÿÿÿÿ--$æorpúú¹p·qÎü²²²- ²²²äçûSû ²²²é7ýXîü ²²²è«þWbþ ²²²áPÑÿû ÿTimes New Roman4-ð.
XÀÿ2
'Fý
SDU Header6EEF*+0* &ÿÿÿÿ-ð ÿÿÿÿÉfþ`û ÿTimes New Roman%-ð.
À+2
ÈþKey #1F*000 &ÿÿÿÿ-$Ñÿ7ÿ&ÿ&,ÿ,ÿÿòÿfþÐëý`û ÿTimes New Roman4-ð.
XÀ̯2
GþKey #2F*000û ÿTimes New Roman%-ð.
ÀF*2
$ý3Keys as received in theF*0&*&++*0+000+û ÿTimes New Roman4-ð.
ÀF2
ý3
H.245 channelF000*0+00*&TNPP &ÿÿÿÿ--ðûŒ"Systemn-ðPowerPoint Document(CEÿÿÿÿweDocumentSummaryInformation8ÿÿÿÿFÿÿÿÿªPersistentStorage Directory8ÿÿÿÿÿÿÿÿÿÿÿÿa>_947279114ÿÿÿÿÿÿÿÿK ÀF ä¹Kç)œÊKç)œ
¡¢£€¥Š§š©þÿÿÿ«¬®¯°±þÿÿÿÀŽµ¶·ž¹º»ŒœŸ¿þÿÿÿÝÂÃÄÅÆÇÈÉÊËÌÍþÿÿÿÏÐÑÒÓÔÕÖ×ØÙÚÛþÿÿÿÞßáíûâãäåæçèéêëìøùïðñòóôõö÷þÿÿÿúýýÿÿÿþÿÿÿeèÿÿteé,ààØb) PØöòÿÿ:ëÿÿfØáØáØáÈÿÿ4Ò(ºÿÿºÿÿÖÿÿ âá°ÿÿåÿÿT ³4ØÔ Ð@ð`@æËáåÿÿT ³4 @@``@æËáåÿÿT ³4Ð@ð`0 @æËáÕÿÿø¶ÿÿL ·<Times New RomanÊá¶ÿÿL ·<"ArialÊáÕÿÿï$äÿÿ)ÿÿB*
8ÔØwPüÿÿb,,b,b,^,Pÿÿ ÿxT3Pýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿdd×ÿÿÿ4"L"X"d"ÔØwPüÿÿb bb^Pÿÿ\$ÿt$ýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddä×ÿÿÿ(,(8(D(ÔØwPüÿÿbbb^Pÿÿ<*ÿT*ýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddô×ÿÿÿPÿÿ3PøÔØwPüÿÿbbb^PÿÿÿPóddþÿÿÿ×ddþÿÿÿVddþÿÿÿÈddþÿÿÿddþÿÿÿ×ÿÿÿxTÔØwPüÿÿbbb^Pÿÿÿýÿÿdd×ýÿÿddVýÿÿddÈýÿÿddýÿÿddÀ×ÿÿÿÿÿàûÿÿÔØÿÿÿÿwPüÿÿbÿÿÿÿÿøóÿbÿÿHóÿb:ÿÿfÿ^âÿÿÿP`ßÿÿèóÿ àÿÿÿf8ßêTT×ÿßÿÿ(ßL
ß~úVÿÿÿ.B`ÈÿÿÿRpͪìÿÍÿÿÍÍŠÊ×ÿÿÿH^°ÔØÿÿÿÿwPüÿÿbÿÿÆÿÿÿÿÿÿÖÿÿÿÿÿÿÿÿÿÿbÿÿÿÖÿÿÿÿÿÿbÿÿÿÿ^ÿÿÿÿÿÿÿÿÿÿrÿPØÍÿÿlÌÿÿÿh¹ÿÿÀÿÿÿÿÿuh×ÿ3PÿÿP`Vÿ3PÿÿÿÿÿÿÈÿÿÿÿÿÿÿ3PÿÿÿxT3PK×ÿÿÿÉŠèÔØÿÿÿÿwPüÿÿbÿÿXÿ'ÿÿoÿb(Íÿÿ0ÍÿbÈÿÿÿ^ÃÿÿSÿPPÍÿÿXÍÿ`ÿÿÿKpͳ(ì×ÿÍÿÿÍÍ¿ OVÿÿÿh×!H
øÈÿÿÿ¯" ó÷"ìÈÿÍÿÿ8
ß(ð¹K${×ÿÿÿ÷$<@ÔØÿÿÿÿwPüÿÿbÿÿ(ÿG'ÿÿw'ÿbðßÿÿžßÿb<ÿÿXÿ^§(ÿÿï(ÿPÈßÿÿßÿzÐÿÿÿ=*øß*X(×ÿÍÿÿžÍÐÀÍm+ýVÿÿÿ œ,pàèÈÿÿÿ-(Íõ-(ÿÍÿÿ ÍšÍ/×ÿÿÿ10*ðÄÿÿÅÁ(ýÿÿÿýÿÿÿœ8ÿ00¡ÿÿt :À'PÔb¢ÿÿD£$ÿÿµàÿÿìã42Öýÿÿddâ3î5ìÿÿ/î/ìÿÿ0î0ìÿÿ1î1Ðÿÿ;
Ñîÿÿ{;ïíÀôÿÿ÷ÿÿ@p÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿã9¹ÿÿíºÙPžÿÿÉÀÿÿÁ(ýÿÿÿõÿÿ øÿÿ°øÿÿúÿÿýÿÿÿœ8ÿÿ00ÖbÀÿÿ)Á(ýÿÿÿŠõÿÿvøÿÿ¥øÿÿùÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿi£$@ùÿÿàõÿÿøÿÿkøÿÿyùÿÿµàÿÿî5CODECìÿÿ</î,/âèbìÿÿX0îH0ã4èýÿÿddìÿÿ(1î1áèÿÿÿÿÀÿÿÁ(ýÿÿÿ|Ðöÿÿ`°ýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿøÿÿÀ0úÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿvøÿÿTúÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$P°øÿÿ£úÿÿµàÿÿî5abcdìÿÿ</î,/âhÉbìÿÿX0îH0ã4hÉýÿÿddìÿÿ(1î1áhÉÿÿÿÿ¹ÿÿºÙPžÿÿàÀÿÿÁ(ýÿÿÿ`úÿÿÀüÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ@Á(ýÿÿÿVúÿÿ4üÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ° :Ñ'PÔb¢ÿÿ£$Púÿÿ£úûÿÿµ×Kûÿÿàÿÿî5abcdìÿÿ</î,/â4ÕbìÿÿX0îH0ã44Õýÿÿddìÿÿ(1î1á4Õÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿÀÿÿÿýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿ4ÿÿÿŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$QPýÿÿ£úþÿÿµàÿÿî5abcdìÿÿ</î,/âábìÿÿX0îH0ã4áýÿÿddìÿÿ(1î1ááÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿðÀ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿæÄŠýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$QP £µàÿÿî5abcdìÿÿ</î,/âÌìbìÿÿX0îH0ã4Ììýÿÿddìÿÿ(1î1áÌìÿÿÿÿÀÿÿ
Á(ýÿÿÿ|Æùÿÿfÿÿÿýÿÿÿœ8ÿÿÿ00 P¡ÿÿõ :Ñ'PÔb¢ÿÿÅ£$Q0úÿÿÿÿÿZiµ×ýÿÿöÿÿÿàÿÿUî5Transport De-Segmentationìÿÿ</î,/âÌäbìÿÿX0îH0ã4ÌäýÿÿddìÿÿX1îH1
áÌäÿÿÿÿáÌäÿÿÿÿáÌäÿÿÿÿ¹ÿÿôºÙPžÿÿÐÀÿÿÁ( >÷ÿÿ8úÿÿáøÿÿØÿÿÿýÿÿÿœ8ÿ00Öb@Àÿÿ0Á(ýÿÿÿêõÿÿýÿÿúÿÿ3þÿÿðýÿÿÿœ8ÿÿÿ00Öbð¡ÿÿ :Ñ'PÔb¢ÿÿp£$QÝýÿÿð$öÿÿ0ýÿÿcúÿÿþÿÿµàÿÿî5abcdabcdabcdìÿÿ</î,/âøbìÿÿX0îH0ã4øýÿÿddìÿÿ(1î1áøÿÿÿÿ¹ÿÿ
ºÙPžÿÿæÀÿÿÁ(ýÿÿÿp`ð pýÿÿÿœ8ÿ00ÖbÀÿÿFÁ(ýÿÿÿƶ Öýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ¶ :Ñ'PÔb¢ÿÿ£$QÓ` ¹µ×ªFàÿÿî
5Decryptionìÿÿ</î,/
â|bìÿÿX0îH0
ã4|ýÿÿddìÿÿ(1î1
á|ÿÿÿÿÀÿÿÁ( @0*|`ð@°ýÿÿÿœ8ÿÿ00 PÀôÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿCÙpúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿödpúÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$QÀpúÿÿÀ*ùµàÿÿî5abcdìÿÿ</î,/âPbìÿÿX0îH0ã4Pýÿÿddìÿÿ(1î1áPÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ)Cépúÿÿýÿÿÿœ8ÿ00ÖbpúÿÿÀÿÿ(Á(ýÿÿÿd&púÿÿýÿÿÿœ8ÿÿ00Öbpúÿÿ¡ÿÿ :Ñ'PÔb¢ÿÿh£$ÐpúÿÿÀ#* µàÿÿî5abcdìÿÿ</î,/â(bìÿÿX0îH0ã4(ýÿÿddìÿÿ(1î1á(ÿÿÿÿÀÿÿÁ(ýÿÿÿ|ÐöÿÿÐýÿÿÿœ8ÿÿ00 P¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿÀ÷ÿÿàpùÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ¶÷ÿÿŠùÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pð÷ÿÿÃZùÿÿ©µàÿÿî5abcdìÿÿ</î,/âè3bìÿÿX0îH0ã4è3ýÿÿddìÿÿ(1î1áè3ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`úÿÿàüÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVúÿÿŠ4üÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$púÿÿÃúûÿÿ©µàÿÿî5abcdìÿÿ</î,/âŽ?bìÿÿX0îH0ã4Ž?ýÿÿddìÿÿ(1î1áŽ?ÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ`ýÿÿàÿÿÿ ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿVýÿÿŠ4ÿÿÿÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$pýÿÿÃúþÿÿ©µàÿÿî5abcdìÿÿ</î,/âKbìÿÿX0îH0ã4Kýÿÿddìÿÿ(1î1áKÿÿÿÿ¹ÿÿìºÙPžÿÿÈÀÿÿÁ(ýÿÿÿ0àà ýÿÿÿœ8ÿ00ÖbÀÿÿ(Á(ýÿÿÿ&ŠÆýÿÿÿœ8ÿÿ00Öb¡ÿÿ :Ñ'PÔb¢ÿÿh£$p`ÃÊ©µàÿÿî5abcdìÿÿ</î,/âLWbìÿÿX0îH0ã4LWýÿÿddìÿÿ(1î1áLWÿÿÿÿÀÿÿÁ( @0*|ðàÐ Ðôÿÿýÿÿÿœ8ÿÿ00 PÀÿÿÁ(ýÿÿÿ|<÷ÿÿ¥Ì÷ÿÿÅýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|Üùÿÿ¯lúÿÿÏýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|ÅüÿÿUýÿÿÍýÿÿÿœ8ÿ00 PÀÿÿÁ(ýÿÿÿ|¢ÿÿÿ2¿ýÿÿÿœ8ÿ00 PÀÿÿ^Á(ýÿÿÿ|Rúÿÿ þÿÿ€ýÿÿÿœ8ÿÿÿ00 P¡ÿÿÎ :Ñ'PÔb¢ÿÿ£$Núÿÿ¡fþÿÿµ×úÿÿVàÿÿ.î
5SDU Headerìÿÿ</î,/
âlRbìÿÿX0îH0
ã4lRýÿÿddìÿÿ@1î01álRÿÿÿÿálRÿÿÿÿ¹ÿÿ2ºÙPÐÿÿÑÀÿÿÁ(ýÿÿÿÀÌüÿÿ þÿÿýÿÿÿœ8ÿP00ÖbÀÿÿZÁ(ýÿÿÿæÆüÿÿ æýÿÿýÿÿÿ6Pœ8ÿÿÿP00Öb¡ÿÿÊ :Ñ'PÔb¢ÿÿ£$ýÿÿ ãüÿÿP Éýÿÿµ×8ýÿÿàÿÿ*î5Key #1ìÿÿ</î,/âbìÿÿX0îH0ã4ýÿÿddìÿÿ@1î01áÿÿÿÿáÿÿÿÿÀÿÿÁ( p+6|àUþÿÿp¥ÿÿÿýÿÿÿœ8ÿ3Pÿ00 PÀÿÿÁ(ýÿÿÿ|¿Öûÿÿ Ëüÿÿýÿÿÿœ8ÿ3Pÿ00 PÀÿÿ*Á(ýÿÿÿ|ÚÄûÿÿ~ äüÿÿýÿÿÿœ8ÿÿ3Pÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿj£$ÑüÿÿáûÿÿD Çüÿÿµàÿÿî5Key #2ìÿÿ</î,/âüýbìÿÿX0îH0ã4üýýÿÿddìÿÿ(1î1áüýÿÿÿÿÀÿÿ©Á(ýÿÿÿ|+ùÿÿ
ûÿÿýÿÿÿœ8ÿÿ3Pÿ00 P¡ÿÿ :Ñ'PÔb¢ÿÿé£$ÑIúÿÿeùÿÿZhûÿÿµ×mQúÿÿàÿÿyî%5Keys as received in the
H.245 channelìÿÿ</î,/%âDbìÿÿ 0î0ã4Dýÿÿdd
ã4Dýÿÿddìÿÿ(1î1%áDÿÿÿÿÐÿÿÍÑøÿÿ©ïíÀôÿÿ÷ÿÿ@p×bï$7ÿÿÿÌ33ÌÌÌÿ²²²ï$7ÿÿÿÿÿÿÿÿÿÿ3ï$7ÿÿÌ3333ÌÿÌfï$7ÿÿÿ999ËËËMMMêêêï$7ÿÿÿÿÌfÿÌÌÀÀÀï$7ÿÿÿËËËfÿÿ3ï$7ÿÿÿ3ÿÿÌÌ̲²²÷ÙÿÿHÚºÿÿ.ºÿÿ/ºÿÿ0ôÿÿ4xï$ÿÿÿÌ33ÌÌÌÿ²²²ÀÿÿÁ(ýÿÿÿÀôÿÿ÷ÿÿ@pýÿÿÿœ8ÿÿ00×bžÿÿ
Âÿÿ\ÃbÁ(ýÿÿÿ Ppöÿÿùÿÿ àûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿŽ :Ä'PÔbäÿÿ£$Äÿÿªöÿÿ-ùÿÿV Ãûÿÿµàÿÿ,î 5Click to edit Master title styleìÿÿ</î,/ âHe,bìÿÿX0îH0 ã4Heýÿÿddìÿÿ(1î1 áHeÿÿÿÿÂÿÿ2ÃbÁ(ýÿÿÿ Ppöÿÿpüÿÿ ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :Ä'PÔbäÿÿZ£$ÄÿÿªöÿÿüÿÿV sµàÿÿîR5Click to edit Master text styles
Second level
Third level
Fourth level
Fifth levelìÿÿÀ/î°/!âli b
âlibâlibâlibìÿÿx0îh0!ã4liýÿÿdd
ã4liýÿÿddã4liýÿÿdd
ã4liýÿÿddã4liýÿÿddìÿÿ(1î1RáliÿÿÿÿÂÿÿ=ÃbÁ(ýÿÿÿ Ppöÿÿð ûÿÿýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªöÿÿ
æúÿÿóµàÿÿ
î5*ìÿÿ</î,/â0obìÿÿX0îH0ã40oýÿÿddìÿÿ(1î1á0oÂÿÿ=ÃbÁ(ýÿÿÿ Ppüÿÿðýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿªüÿÿ
Vóµàÿÿ
î5*ìÿÿ</î,/â0sbìÿÿX0îH0ã40sýÿÿddìÿÿ(1î1á0sÂÿÿ=ÃbÁ(ýÿÿÿ Pàð ýÿÿÿœ8ÿÿÿ00Öb¡ÿÿ :À'PÔb¢ÿÿe£$Àÿÿ
V óµàÿÿ
î5*ìÿÿ</î,/â0wbìÿÿX0îH0ã40wýÿÿddìÿÿ(1î1á0wºÿÿÐÿÿÑÿÿÿDºÿÿ_VBA_PROJECTºÿÿ úÿÿŽþêÿÿ0ûûý4 d dededP|düÿÿBýÿÿÿÿ$dãÿÿeé,êþÿÕÍÕ.+,ù®0d`h š°
žäOn-screen ShoweArialTimes New RomanDefault DesignNo Slide TitleFonts UsedDesign Template
Slide Titleseadonly def/packedarraytype{dup rcheck{dup xcheck{({)tprint{typeprint}
forall(})tprint}{([)tprint{typeprint}forall(])tprint}ifelse}{pop
(-packedarray- )tprint}ifelse}readonly def/courier/Courier findfont 10
scalefont def end errordict/handleerror{systemdict begin $error begin $brkpage
begin newerror{/newerror false store vmstatus pop pop 0 ne{grestoreall}if
showpage initgraphics courier setfont lmargin 720 moveto(ERROR: )prnt
errorname prnt nl(OFFENDING COMMAND: )prnt/command load prnt $error/ostack
known{nl nl(STACK:)prnt nl nl $error/ostack get aload length{==}repeat}if
systemdict/showpage get exec(%%[ Error: )print errorname =print
(; OffendingCommand: )print/command load =print( ]%%)= flush}if end end end}
dup 0 systemdict put dup 4 $brkpage put bind readonly put/currentpacking where
{pop/setpacking where{pop oldpack setpacking}if}if
%%EndProcSet
userdict /Pscript_Win_Driver_Incr 200 dict dup begin put
%%BeginResource: file Pscript_FatalError 2.0 0
/FatalErrorIf{{initgraphics findfont exch scalefont setfont counttomark 3 div
cvi{moveto show}repeat showpage quit}{cleartomark}ifelse}bind def
%%EndResource
/VM? {vmstatus exch sub exch pop gt { [
(This job requires more memory than is available in this printer.) 100 500
(Try one or more of the following, and then print again:) 100 485
(In the PostScript dialog box, click Optimize For Portability.) 115 470
(In the Device Options dialog box, make sure the Available Printer Memory is accurate.) 115 455
(Reduce the number of fonts in the document.) 115 440
(Print the document in parts.) 115 425
12 /Times-Roman showpage
(%%[ PrinterError: Low Printer VM ]%%) =
true FatalErrorIf}if} bind def
30000 VM?
%%BeginResource: file Pscript_Win_Utils 2.0 0
/|/def load def/,/load load |/~/exch , |/?/ifelse , |/!/pop , |/`/begin , |/^
/index , |/@/dup , |/+/translate , |/$/roll , |/U/userdict , |/M/moveto , |/-
/rlineto , |/&/currentdict , |/:/gsave , |/;/grestore , |/F/false , |/T/true ,
|/N/newpath , |/E/end , |/Ac/arc , |/An/arcn , |/A/ashow , |/D/awidthshow , |
/C/closepath , |/V/div , |/O/eofill , |/L/fill , |/I/lineto , |/-C/rcurveto ,
|/-M/rmoveto , |/+S/scale , |/Ji/setfont , |/Lc/setlinecap , |/Lj/setlinejoin
, |/Lw/setlinewidth , |/S/show , |/LH/showpage , |/K/stroke , |/W/widthshow ,
|/R/rotate , |/b{bind |}bind |/bd{bind |}bind |/xd{~ |}bd/ld{, |}bd/lw/Lw ld
/lc/Lc ld/lj/Lj ld/sg/setgray ld/L2? F/languagelevel where{! languagelevel 2
ge{! T}if}if |/g{@ not{U/DefIf_save save put}if U/DefIf_bool 2 ^ put}b
/DefIf_El{if U/DefIf_bool get not @{U/DefIf_save get restore}if}b/e{DefIf_El !
}b/self & |/reinitialize{[/TextInit/GraphInit/UtilsInit counttomark{@ where{
self eq}{F}?{cvx exec}{!}?}repeat cleartomark}b/initialize{`{/ADO_mxRot ~ |
/TextInitialised? F | reinitialize E}{U/Pscript_Win_Data 200 dict @ ` put
/ADO_mxRot ~ |/TextInitialised? F | reinitialize}?}b/terminate{!{& self eq{
exit}{E}?}loop E}b/suspend/terminate , |/resume{` Pscript_Win_Data `}b/snap{
transform 0.25 sub round 0.25 add ~ 0.25 sub round 0.25 add ~ itransform}b
/dsnap{dtransform round ~ round ~ idtransform}b<04>cvn{}|/setjn{{statusdict
/jobname known{statusdict/jobname 3 -1 $ put}if}stopped cleartomark}b/solid{[]
0 setdash}b/setdsh{0 setdash}b/colspRefresh{}b/rp{4 2 $ M 1 ^ 0 - 0 ~ - neg 0
-}b/rr{1 ^ 0 - 0 ~ - neg 0 - C}b
%%EndResource
%%BeginResource: file Pscript_Win_Utils_L1 2.0 0
L2? not g{/rf{N rp L}b/fx{1 1 dtransform @ 0 ge{1 sub 1}{1 add -0.25}? 3 -1 $
@ 0 ge{1 sub 1}{1 add -0.25}? 3 1 $ 4 1 $ idtransform 4 -2 $ idtransform}b/BZ{
4 -2 $ snap + +S fx rf}b/rs{N rp C K}b/rc{N rp clip N}b/sg{setgray}b/sco{
setrgbcolor}b/sgco{{sg}{sco}?}b}e
%%EndResource
Ole
ÿÿÿÿÿÿÿÿÿÿÿÿbPIC
HJÿÿÿÿcLMETAÿÿÿÿÿÿÿÿÿÿÿÿ³ÜCompObjIMÿÿÿÿehw;f* ê:&ÿÿÿÿWordMicrosoft Word
û-ûÖÿTimes New Roman%- üÎÎÎ- ú"-hC ú"-ðüÿÿÿ-ð ú"-þü-ð ú"-úr]r-ðüÿÿÿ- ú"-o -ð-ðüÿÿÿ- ú"-lá¡-ð-ðüÿÿÿ- ú"-Åáj-ð-ðüÿÿÿ- ú"-vá-ð-ðO8ìûÒÿ"Arial¶- 2
ìPhysical Layer
'ÿÿ÷ÞÀì-2
Âì
Link Layer
'ÿÿ_,)p-)2
+pUnreliable Transport!
'ÿÿ_l)Ô-&2
+ÔReliable Transport!
'ÿÿü- ú"-áÃ-ð-ž6ð-2
ð
Network Layer!
!
'ÿÿüÿÿÿ- ú"-
A-ð-ðüÿÿÿ- ú"-
ùA-ð-ðüÿÿÿ- ú"-cáDh-ð-ðš|ûßÿ"Arial-2
}G.XXX 'ÿÿ€tûÚÿ"Arial-2
uH.26X'ÿÿÑUº-2
ºH.245!
'ÿÿüÎÎÎ- ú"- ù -ð -ð- ú"-šAû-ð-ªŽeûãÿ"ArialNe-2
eRTP'ÿÿ¢Ú{|-2
||T.124'ÿÿ;Û|-2
|T.125'ÿÿá¹-2
â¹Q.931'ÿÿª$-2
$RTCP'ÿÿüÎÎÎ- ú"-
C¡-ð
-ð ×/°æ-2
±æCall'ÿÿ9å¯-2
æ¯ Signaling'ÿÿüÿÿÿ- ú"-
CiÄö-ð
-ð UrÍ-2
sÍH.225.0'ÿÿ-Ü[-:2
Ý[Terminal Control and Management
'ÿÿüÿÿÿ- ú"-
CüÄ-ð
-ð üÿÿÿ- ú"-
CáÄi-ð
-ð ôÔÎ-2
ÏData'ÿÿ!Êú-2
ûApp'ÿÿ©å2-2
æ2AV App'ÿÿüÎÎÎ- ú"-
¡D¥-ð
-ð DgÆ-2
hÆH.225.0'ÿÿÁ>¹-2
¹Terminal
'ÿÿû*Õñ-2
Öñto'ÿÿ)Z-2
Gatekeeper
'ÿÿ^;7±-2
8± Signaling'ÿÿ;oÖ-2
pÖ(RAS)
'ÿÿ&ÿÿÿÿëy ü- ú"-
#ùã-ð
-ð ü- !ð=Íã,-ð êíF-2
îF
Encryption
'ÿÿ
&
ÿÿÿÿ,i-2
Sec.'ÿÿLl%-2
&Cap.'ÿÿ&ÿÿÿÿI±üÎÎÎ- ú"-
OÿÿÌ-ð
-ð c=þ- 2
>þScope of H.235'ÿÿ
&
ÿÿÿÿõV¿±-&2
Á±Transport Security
'ÿÿüÿÿÿ- ú"-
µábk-ð
-ð Oß(-2
)T.123'ÿÿ·²NûÖÿ"Arial- #2
NNetwork Security
'ÿÿ-ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿgOlePres000LOÿÿÿÿÁüWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿÎÜSummaryInformation(NPÿÿÿÿhÀÿÿÿÿÿÿÿÿv;e*Ô ê:&ÿÿÿÿWordMicrosoft Word
û-ûÖÿTimes New Roman%- üÎÎÎ- ú"-hC ú"-ðüÿÿÿ-ð ú"-þü-ð ú"-úr]r-ðüÿÿÿ- ú"-o -ð-ðüÿÿÿ- ú"-lá¡-ð-ðüÿÿÿ- ú"-Åáj-ð-ðüÿÿÿ- ú"-vá-ð-ðO8ìûÒÿ"Arial¶- 2
ìPhysical Layer
'ÿÿ÷ÞÀì-2
Âì
Link Layer
'ÿÿ_,)p-)2
+pUnreliable Transport!
'ÿÿ_l)Ô-&2
+ÔReliable Transport!
'ÿÿü- ú"-áÃ-ð-ž6ð-2
ð
Network Layer!
!
'ÿÿüÿÿÿ- ú"-
A-ð-ðüÿÿÿ- ú"-
ùA-ð-ðüÿÿÿ- ú"-cáDh-ð-ðš|ûßÿ"Arial-2
}G.XXX 'ÿÿ€tûÚÿ"Arial-2
uH.26X'ÿÿÑUº-2
ºH.245!
'ÿÿüÎÎÎ- ú"- ù -ð -ð- ú"-šAû-ð-ªŽeûãÿ"ArialNe-2
eRTP'ÿÿ¢Ú{|-2
||T.124'ÿÿ;Û|-2
|T.125'ÿÿá¹-2
â¹Q.931'ÿÿª$-2
$RTCP'ÿÿüÎÎÎ- ú"-
C¡-ð
-ð ×/°æ-2
±æCall'ÿÿ9å¯-2
æ¯ Signaling'ÿÿüÿÿÿ- ú"-
CiÄö-ð
-ð UrÍ-2
sÍH.225.0'ÿÿ-Ü[-:2
Ý[Terminal Control and Management
'ÿÿüÿÿÿ- ú"-
CüÄ-ð
-ð üÿÿÿ- ú"-
CáÄi-ð
-ð ôÔÎ-2
ÏData'ÿÿ!Êú-2
ûApp'ÿÿ©å2-2
æ2AV App'ÿÿüÎÎÎ- ú"-
¡D¥-ð
-ð DgÆ-2
hÆH.225.0'ÿÿÁ>¹-2
¹Terminal
'ÿÿû*Õñ-2
Öñto'ÿÿ)Z-2
Gatekeeper
'ÿÿ^;7±-2
8± Signaling'ÿÿ;oÖ-2
pÖ(RAS)
'ÿÿ&ÿÿÿÿëy ü- ú"-
#ùã-ð
-ð ü- !ð=Íã,-ð êíF-2
îF
Encryption
'ÿÿ
&
ÿÿÿÿ,i-2
Sec.'ÿÿLl%-2
&Cap.'ÿÿ&ÿÿÿÿI±üÎÎÎ- ú"-
OÿÿÌ-ð
-ð c=þ- 2
>þScope of H.235'ÿÿ
&
ÿÿÿÿõV¿±-&2
Á±Transport Security
'ÿÿüÿÿÿ- ú"-
µábk-ð
-ð Oß(-2
)T.123'ÿÿ·²NûÖÿ"Arial- #2
NNetwork Security
'ÿÿ-Ü¥hWà eÜ5ejjjjööö
* +1:::::FFFVXXX=ŒQŒ
\XŽ(+öF :FFF+Vjj::VVVFj:ö:VÀ}œâÃŒ
jjjjFVVV
Network Security
Transport Security
Physical Layer
Link Layer
Unreliable Transport
Reliable Transport
Network Layer
G.XXX
H.26X
H.245
RTP
T.124
T.125
Q.931
RTCP
Call
Signaling
H.225.0
Terminal Control and Management
Data
App
AV App
H.225.0
Terminal
to
Gatekeeper
Signaling
(RAS)
Encryption
Sec.
Cap.
Scope of H.235
T.123
€ÀN¥ÀNŠ§š\©]ª20(è,Í!ÿÿÿ20(p#(áÿÿÿÿÿÿ0æ/&Õ'k!Ó_ÎÎÎÎÎÎ00&%#k!Á_ÎÎÎÎÎÎ0ç/&G3!!G0è/&wM0òñG0é/&*·ÿÿÿÿÿÿ0ê/&%#H*Ç
}ÿÿÿÿÿÿ0ë/&¿+æ®ÿÿÿÿÿÿ0ì/&/æ±ÿÿÿÿÿÿ2í/(Ÿ/7ÿÿÿÿÿÿ2î/(Ÿ]-ÿÿÿÿÿÿ2ï/(*Sÿÿÿÿÿÿ2ð/($
*ÿÿÿÿÿÿ0ñ/&g-æ®ÿÿÿ2ò/(Ò/,ÿÿÿÿÿÿ0ó/&b!PŸÿÿÿÿÿÿ0ô/&Sb!ØŸÿÿÿÿÿÿ0õ/&¬+m!@_ÿÿÿÿÿÿ2ö/(ùy"YÓÿÿÿÿÿÿ2÷/(QV"wâÿÿÿÿÿÿ2ø/(j(
#àÿÿÿÿÿÿ0ù/&%%ÎÎÎÎÎÎ0ú/&:b!9×ÿÿÿ2û/(hn'xµÿÿÿÿÿÿ2ü/( ,x"õÿÿÿÿÿÿ2ý/(,W%õÿÿÿÿÿÿ2ÿ/(Ëáµÿÿÿÿÿÿ20(þn'áµÿÿÿÿÿÿ20(n$u#Zµÿÿÿÿÿÿ20(e#r$µÿÿÿÿÿÿ00&$_ÿÿÿÿÿÿ20(ø#I"µÿÿÿÿÿÿ20(|Œµÿÿÿÿÿÿ00&*]ÿÿÿÿÿÿ00&®+
>[ÿÿÿÿÿÿ2 0(,7µÿÿÿÿÿÿ2
0(&, Zµÿÿÿÿÿÿ20(s€;µÿÿÿÿÿÿ00&jo!·ÊÎÎÎÎÎÎ2
0("Yµÿÿÿÿÿÿ20(Ë#wµÿÿÿÿÿÿ20(Ö&$µÿÿÿÿÿÿ20(%:µÿÿÿÿÿÿ20(£ý%µÿÿÿÿÿÿ20(S'áµÿÿÿÿÿÿ0i$ 2&1&GØÿÿÿ(È/
µÿÿÿÿÿÿâèÛ~ÿ20($*
%µÿÿÿÿÿÿ20($*§%µÿÿÿÿÿÿt0j%V=Ó&<ÒÎÎÎÎÎÎ(ï(µÿÿÿÿÿÿÌàä€ÿ00&»+É&1Zÿÿÿÿÿÿ20(,*õÿÿÿÿÿÿ45FG°·ŸÅ^ù÷ñëåñßÝu]abc]abc]abc]abc]uDa5FGZ[jkvw ¡¯°¶·œŸÄÅÉÊÐÑ×ØÞßäåêëõöÿ !&'+,34þ²!ðþæþþåþþ:þþþþSþþŠþþþþ]»þþzÓþþèþþ{£þþãþþÈ£þþå£þþå£þþ^£þþ£þþ£þþœ£þþ£þþZ£þþ;£þ-4<=FGKLWXbcijuv{|þ]£þþ~£þþ£þþ>£þþ£þþå£þþ£þþ£þþ£þþ£þþÈ£þþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&6BXl{£ª°¶ÁËìò÷ÿ#.5AGM]dgÿÿÿÿ ÿÿ^4
!"#$%&'()*+,-./0123²äFvŠÖ6fÈú,^Àð PŽæ F x ª Ü
@
r
€
Ô
8hÊü.^Âô&
X
$Vü,5ÿ@HP DeskJet 520 PrinterLPT1:DESKJETCHP DeskJet 520 PrinterHP DeskJet 520 Printer(,,A^|žÖ¹×¹ÖHP DeskJet 520 Printer(,,A^|žÖ¹×¹Ö1Times New RomanSymbol&Arial"ðÐhÚf+!(
James Toga
James Togaþÿà
òùOh«+'³Ù0 ¬žÌØäø
@LX
dpxätõþÿJames TogaNormal.dotJames Toga2Microsoft Word for Windows 9500@FÃ#@@,BÄŒ@e¹âÃŒ+þÿÕÍÕ.+,ù®0šHDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿoØ_947279116GeU ÀF äKç)œgõKç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿsPIC
RTÿÿÿÿtLPdlt|ä
Acme CorpEDLr;Æ
Ž!Ïèèr;Æ
£
U&ÿÿÿÿWordMicrosoft WordA
û-METAÿÿÿÿÿÿÿÿÿÿÿÿvPCompObjSWÿÿÿÿ€hObjInfoÿÿÿÿÿÿÿÿÿÿÿÿŠOlePres000VYÿÿÿÿ§p
¡¢£þÿÿÿ¥þÿÿÿþÿÿÿš©ª«¬®¯°±²³Žµ¶·ž¹º»ŒœŸ¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔþÿÿÿÖ×ØÙÚÛþÿÿÿÝÞßþÿÿÿþÿÿÿâþÿÿÿäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2
\'AGRQ404'ÿÿiV
-2
V
AGCF40)'ÿÿAäé4-2
ö4AxxQ%%4'ÿÿÑ64-2
C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2
£A(
.., AliasK2*&'ÿÿx@8ûÎÿ"Arial-
2
BAa'ÿÿk-2
A,
.)K'ÿÿx8Ô-2
BÔA'ÿÿk â-(2
âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2
ç©#A cryptoTokens [
(cryptoEPPwdEncr)
]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx
ú"-ðü- úÿÿÿ"-$õûyõg
y-ðüÿÿÿ-ð ú"->þ>
-ðü- úÿÿÿ"- $
-?
Pä?-ð -ð ú"-HêH
-ðü- úÿÿÿ"- $õZûHõ7
H-ð -ð ú"-
-ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2
¶³#A cryptoTokens [
(cryptoGKPwdEncr)
]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh
-2
áh
AxCF%0)'ÿÿ8m
ÙÈ-U2
èÈ1A(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;Æ
H £
U&ÿÿÿÿWordMicrosoft WordA
û-ûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2
\'AGRQ404'ÿÿiV
-2
V
AGCF40)'ÿÿAäé4-2
ö4AxxQ%%4'ÿÿÑ64-2
C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2
£A(
.., AliasK2*&'ÿÿx@8ûÎÿ"Arial-
2
BAa'ÿÿk-2
A,
.)K'ÿÿx8Ô-2
BÔA'ÿÿk â-(2
âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2
ç©#A cryptoTokens [
(cryptoEPPwdEncr)
]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx
ú"-ðü- úÿÿÿ"-$õûyõg
y-ðüÿÿÿ-ð ú"->þ>
-ðü- úÿÿÿ"- $
-?
Pä?-ð -ð ú"-HêH
-ðü- úÿÿÿ"- $õZûHõ7
H-ð -ð ú"-
-ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2
¶³#A cryptoTokens [
(cryptoGKPwdEncr)
]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh
-2
áh
AxCF%0)'ÿÿ8m
ÙÈ-U2
èÈ1A(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿà
òùOh«+'³Ù0 ¬žÌØäø
@LX
dpxWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿîxSummaryInformation(XZÿÿÿÿÕÀDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿÜØ_947279117ÿÿÿÿÿÿÿÿ_ ÀFÑ
Lç)œÀb/Lç)œÜ¥hWà eßxÈjjjjŠŠŠÐÐÐÐÐÐ
Ú
ÐÇ1ääää人ºÊÌÌÌ5ÔÕÔ©øXP(ÇŠºäÖºººÇÊjjääÊÊʺj<äŠäÊ b¿ŒºÂjjjjºÊÊÊ
cryptoTokens [
(cryptoGKPwdEncr)
]
cryptoTokens [
(cryptoEPPwdEncr)
]
GRQ
GCF
xxQ
IRR
(
.., Alias
a
,
.)
[Not Authenticated]
xCF
(
, GatekeeperIdentifier,
) [Not Authenticated]
€ÀN¥ÀNŠ§šz#©z#ª20(gÖ)¡;ÿÿÿÿÿÿ2û/(Qç'ÕKÿÿÿÿÿÿ2ò/(å6$ÒÓÿÿÿÿÿÿ2ó/(6&ÃÓÿÿÿÿÿÿ2ô/((¥Óÿÿÿÿÿÿ2õ/(Ç(xÓÿÿÿÿÿÿ2ö/(š!#Áâÿÿÿÿÿÿ2÷/(î$$ÿÿÿÿÿÿ2ø/(/%#,âÿÿÿÿÿÿ2ù/(ë&$yÿÿÿÿÿÿ2ú/('#âÿÿÿÿÿÿ0þ/&ž$
Dÿ/: 5q$cUÿÿÿ T*b*00&év&
D0:«M&bTÿÿÿ aS)aS)00&žô(
D0: 5Ê(cUÿÿÿ T*b*00&ù·*
D0:»*cUÿÿÿ bS*bT*20(Ž6B*¥Óÿÿÿÿÿÿ20(%ñâÿÿÿÿÿÿûú!úûú!úûú!úûú--
-- &$!úúú!úúú!úúú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úûú!úúú!úúú--
-- 6$%úúú%úúú%úúú$úûú$úûú#úûú#úûú"úûú"úúú!úúú!úûú"úûú"úûú#úûú#úûú$úûú$úûú%úûú%úûú%úûú%úûú&úûú&úûú&úúú%úúú--
-- &$&úûú&úûú&úûú&úúú&úúú%úúú%úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú&úûú--
-- $&úýú&úýú&úûú&úûú&úýú&ú9<_au
¥ªÝÞßPùòìòìåìßìßìåìÝu]abc
U]abc]abc
U]abcuDa:;<`aefjkoptu
€¥©ªÜÝÞßþ²!ðþ¡Øþ¡ØþþØØþþÔÀþþÃÀþþŠÀþþyÀþþÂØþþþþ/ØþþzþþØþþŠÀþþòØþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&KPUZ_lowzÇÊß
ßÿÿÿÿ ÿÿßPß
ßö(ZŸð"TžêLÀ4xšìàÿ@HP LaserJet 4 PlusLPT1:HPPCL5MSHP LaserJet 4 PlusHP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d
HP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d
1Times New RomanSymbol&Arial"ÁÐh`P\!(
James Toga
James TogaäHC GJames Toga&GNormal.dotJames Toga2Microsoft Word for Windows 95@FÃ#@@rÕK¿Œ@à9¿ŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTel.Ole
ÿÿÿÿÿÿÿÿÿÿÿÿàPIC
\^ÿÿÿÿáLMETAÿÿÿÿÿÿÿÿÿÿÿÿãøCompObj]aÿÿÿÿhLr;š
Ž!Ÿèèr;š
ø
U&ÿÿÿÿWordMicrosoft Word:ûŒSystem
-ûÿTimes New Roman*íwÀgïw(
€
- åHûœÿŒ"Ar
þÿÿÿþÿÿÿþÿÿÿ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFþÿÿÿHIJKLMþÿÿÿOPQþÿÿÿþÿÿÿTþÿÿÿVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
þÿÿÿ%Å !"#$0²'()*+,-./þÿÿÿ³23456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnoprýÿÿÿstuvwxyz{|}~ialV
2!íw*íwÀgïwV
2
-2
U:GRQ404'ÿÿb
I
-2
I
:GCF40)'ÿÿ;ßâ(-2
ï(:xxQ%%4'ÿÿÌ/(-2
<(:IRR00'ÿÿk~ûµÿ"ArialR
2!íw*íwÀgïwR
2
-2
~:(
.., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB
;!íw*íwÀgïwB
;
-
2
BÜ:a'ÿÿkæ÷-2
÷:,
.)K'ÿÿwê8°-2
B°:'ÿÿk{ œ-(2
œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial
9!íw*íwÀgïw
9
-@2
î#: cryptoTokens [
(cryptoEPPwdHash)
]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré`
r-üÿÿÿ- ðú-8ø8
-ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0
B-- ðú-þøþ
-ðü--$ìþßþ-- ð Ï-@2
#: cryptoTokens [
(cryptoGKPwdHash)
]**....**.*K**..:62:.6**.K-'ÿÿ&Í\
-2
Ú\
:xCF%0)'ÿÿ8P
Ù£-U2
è£1:(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;š
ð ø
U&ÿÿÿÿWordMicrosoft Word:ûObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000`cÿÿÿÿWordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ
÷SummaryInformation(bdÿÿÿÿGžŒSystem
-ûÿTimes New Roman*íwÀgïw(
€
- åHûœÿŒ"ArialV
2!íw*íwÀgïwV
2
-2
U:GRQ404'ÿÿb
I
-2
I
:GCF40)'ÿÿ;ßâ(-2
ï(:xxQ%%4'ÿÿÌ/(-2
<(:IRR00'ÿÿk~ûµÿ"ArialR
2!íw*íwÀgïwR
2
-2
~:(
.., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB
;!íw*íwÀgïwB
;
-
2
BÜ:a'ÿÿkæ÷-2
÷:,
.)K'ÿÿwê8°-2
B°:'ÿÿk{ œ-(2
œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial
9!íw*íwÀgïw
9
-@2
î#: cryptoTokens [
(cryptoEPPwdHash)
]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré`
r-üÿÿÿ- ðú-8ø8
-ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0
B-- ðú-þøþ
-ðü--$ìþßþ-- ð Ï-@2
#: cryptoTokens [
(cryptoGKPwdHash)
]**....**.*K**..:62:.6**.K-'ÿÿ&Í\
-2
Ú\
:xCF%0)'ÿÿ8P
Ù£-U2
è£1:(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-þÿà
òùOh«+'³Ù0Ü¥hWà eß÷ÈjjjjŠŠŠÐÐÐÐÐÐ
Ú
ÐK1ääää人ºÖØØØ=!-|XÔ#KŠºäÖºººKÖjjääÖÖÖºj<äŠäÖ0¿äRÃŒºÂjjjjºÖÖÖ
cryptoTokens [
(cryptoGKPwdHash)
]
cryptoTokens [
(cryptoEPPwdHash)
]
GCF
xxQ
IRR
(
.., Alias
a
,
.)
[Not Authenticated]
xCF
(
, GatekeeperIdentifier,
) [Not Authenticated]
GRQ
€ÀN¥ÀNŠ§š#©#ª20(ç)ö6ÿÿÿÿÿÿ2ý/(Ñþ'Ýâÿÿÿÿÿÿ2õ/(j6ÿ%ÕÓÿÿÿÿÿÿ2ö/(æ(·Óÿÿÿÿÿÿ2÷/(æ¿(Óÿÿÿÿÿÿ2ø/(O!#Óâÿÿÿÿÿÿ2ù/($$©ÿÿÿÿÿÿ2ú/(×$#>âÿÿÿÿÿÿ2û/(&$ÿÿÿÿÿÿ2ü/(³&#âÿÿÿÿÿÿ0þ/&$
Dÿ/:5h$uUÿÿÿ T*t*00&Ûn&
D0:D&uTÿÿÿ tb*tS*00&ì(
D0:5Â(uTÿÿÿ S*t*00&Û¯*
D0:
*uUÿÿÿ tb*tT*2 0(6:*·Óÿÿÿÿÿÿ2
0(B%âÿÿÿÿÿÿ2ô/(Ç-$äÓÿÿÿÿÿÿ:<`ap} ¥ØÝÞßPùòìòìåìßìßìåìåÝu]abc
U]abc]abc
U]abcuDa:;<`aefjkop|} €¥×ØÜÝÞßþ²!ðþþöØþþÞØþþÖÀþþ·ÀþþÀþþÓØþþªþþ>ØþþþþØþþ·ÀþþØþþåÀþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font&KPUZgjruÂÇÊß
ßÿÿÿÿ ÿÿßPß
ßö(ZŸð"Tžê^ÒFvºì$9àÿ@\\BAHARI\JF3-2-D13-4SINe00:winspool\\BAHARI\JF3-2-D13-4SI\\BAHARI\JF3-2-D13-4SIpsXXLettereeeeeeeeeeeeeeeeeeeeeeeee ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\\BAHARI\JF3-2-D13-4SIpsXXLettermicHü¡ ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''1Times New RomanSymbol"Arial"ÁÐh./f!#
James Togajtoga ¬žÌØäô
8DP
\hpxäJames TogaNormaldjtogaTo2Microsoft Word for Windows 95@FÃ#@@Ts-ÃŒ@6QÃŒþÿÕÍÕ.+,ù®0šHPdlt|äDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿNØ_947279119[oi ÀF`SILç)œ@ZLç)œOle
ÿÿÿÿÿÿÿÿÿÿÿÿRPIC
fhÿÿÿÿSLPictureTelÿ.Lr;š
Ž!Ÿèèr;š
} U&ÿÿÿÿWordMicrosoft Word:
û-ûÿTimes New Roman,- METAÿÿÿÿÿÿÿÿÿÿÿÿUCompObjgkÿÿÿÿhObjInfoÿÿÿÿÿÿÿÿÿÿÿÿOlePres000jmÿÿÿÿ
$þÿÿÿþÿÿÿþÿÿÿ ¡¢£€¥Š§š©ª«¬®¯°±þÿÿÿ³Žµ¶·žþÿÿÿº»Œþÿÿÿþÿÿÿ¿þÿÿÿÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛþÿÿÿÝþÿÿÿþÿÿÿàáâãäåæçèéêëìíîïðñòóôõö÷øùúûþÿÿÿýþÿ§žNõÿûœÿŒ"Arial²-2
[õÿ:GRQ404'ÿÿià
$
-2
$
:GCF40)'ÿÿA²è-2
õ:xxQ%%4'ÿÿ6-2
C:IRR00'ÿÿqøgûµÿ"ArialNe-2
!g:(
.., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±-
2
HÄ:a'ÿÿqÈß-2
!ß:,
.)K'ÿÿ~Ë>-2
H:'ÿÿq\ Š-(2
!Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q
-ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ
Ó6
-2
à6
:xCF%0)'ÿÿ>ß-U2
ð1:(
, GatekeeperIdentifier,
) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2
à{: CryptoTokens[
(cryptoEPCert)
]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82
š:CryptoTokens[
(cryptoGKCert)
]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK
-ð-þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿs;š
ü
} U&ÿÿÿÿWordMicrosoft Word:
û-ûÿTimes New Roman,- §žNõÿûœÿŒ"Arial²-2
[õÿ:GRQ404'ÿÿià
$
-2
$
:GCF40)'ÿÿA²è-2
õ:xxQ%%4'ÿÿ6-2
C:IRR00'ÿÿqøgûµÿ"ArialNe-2
!g:(
.., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±-
2
HÄ:a'ÿÿqÈß-2
!ß:,
.)K'ÿÿ~Ë>-2
H:'ÿÿq\ Š-(2
!Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q
-ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ
Ó6
-2
à6
:xCF%0)'ÿÿ>ß-U2
ð1:(
, GatekeeperIdentifier,
) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2
à{: CryptoTokens[
(cryptoEPCert)
]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82
š:CryptoTokens[
(cryptoGKCert)
]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK
-ð-þÿà
òùOh«+'³Ù0 ¬žÌØäø
@LX
dpxä&GqMJames TogaHCNormal.dotJames Toga2Microsoft Word for Windows 95@êVú@WordDocumentÿÿÿÿÿÿÿÿÿÿÿÿ&xSummaryInformation(lnÿÿÿÿ²ÀDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿ¹Ø_947279121ÿÿÿÿÿÿÿÿs ÀF OLç)œÀ?Lç)œÜ¥hWà eÖx¿jjjjŠŠŠÐÐÐÐÐÐ
Ú
ÐÇ1ääää人ºÊÌÌÌ5ÔÕÔ©øXP(ÇŠºäÖºººÇÊjjääÊÊʺj<äŠäÊàL}¿ŒºÂjjjjºÊÊÊ
(
, GatekeeperIdentifier,
) [Not Authenticated]
CryptoTokens[
(cryptoGKCert)
]
CryptoTokens[
(cryptoEPCert)
]
GRQ
GCF
xxQ
IRR
(
.., Alias
a
,
.)
[Not Authenticated]
xCF
€ÀN¥ÀNŠ§š#©#ª2þ/(
%Zâÿÿÿÿÿÿ20(ðž)0
Wÿÿÿÿÿÿ2ÿ/(áØ'!
tÿÿÿÿÿÿ00&á)
0ú/&Í+ýü
2í/(m<$ÒÓÿÿÿÿÿÿ2î/(6&ÃÓÿÿÿÿÿÿ2ï/((¥Óÿÿÿÿÿÿ2ð/(Î(xÓÿÿÿÿÿÿ2ñ/(!#Áâÿÿÿÿÿÿ2ò/(^$$ÿÿÿÿÿÿ2ó/($#,âÿÿÿÿÿÿ2ô/([&$yÿÿÿÿÿÿ2õ/({&#âÿÿÿÿÿÿ0ö/&(¡$
D÷/:5w$bUÿÿÿ T*a*0ø/&i}&
Dù/:+S&bTÿÿÿ aS*aS*0û/&i+
Dü/:+å*bTÿÿÿ aS)aS)2ý/(<6I*¥Óÿÿÿÿÿÿüõúcüüúcüûcüûcü
ûcü
ûcü
û--üfff-- L$$cüýùcüýùcüüùdüûùdüúùdüùùdüøùdü÷ùdü÷ùeü÷ùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùeüöùdüöùdüöùdü÷ùdü÷ùcüøùcüùùcüùùcüûùcüüùcüýùcüýù--ðüfff-- $Bcü
ûcü
ûcü
ûcüûcüûcüüúcüõúcüìúcüãúcüÚúcüÏúcüÄúcüžúcü¬úcü úcüúcüúcüzúcünúcüaúcüUúcüIúcü>úcü3úcü)úcü úcüúcüúcü
úcüúcüúcüþùcüýùcüýùcüþùcüúcüúcü
úcüúcüHIhj¬¯·ºÏÔÕÖ3ùöðìðìðåðßðßðåÝu]abc
U]abcUab]abcabuDaHIhij«¬®¯¶·¹ºÎÏÓÔÕÖþ²!ðþZðþþ1
ðþ1
Øþþ"
ðþþÔÀþþÃÀþþŠÀþþyÀþþÂØþþþþ/ØþþzþþØþþŠÀþþþ²!ðK@ñÿNormala "A@òÿ¡"Default Paragraph Font3Tuz¡€¹ŸÁÖ
Öÿÿÿÿ ÿÿÖ3Ö
ÖíQ³ãGy«ÝAs¥ÕIœ×ÿ@HP LaserJet 4 PlusLPT1:HPPCL5MSHP LaserJet 4 PlusHP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d
HP LaserJet 4 Plus@w XX@MSUDNHP LaserJet 4 Plusä;d
1Times New RomanSymbol&Arial"ÁÐh`W\!(
James Toga
James Toga@žžK¿Œ@Ê¿ŒþÿÕÍÕ.+,ù®0šHPdlt|äPictureTelBLt8a Ú Ý\Fáñòþw»^§_ªôsE÷1F+bŽeÎíÛ¹\G%êøë`Ï(Úp¬'oëc>ãã]ËA[1:Ø'_Óuž9;Ésœ_èhEÌc~&qá=6°-íMmMh}
»#ÉÑĶǺ
MünZhÅýjEIÖà]Ë%ü)ë
E [2l\UtÜÓyp{ÄÕt×@âhHh7Á<Þ]ÇÊìçýŠÁy¿7 s~f}6ÙFÜð0brüêÌjÃB:ès"ôtÏ9;û|1'ÒÉÝ+5ùÓ8©õKž× ò>/6_ì;3¶º6Êgëc1[HïÐprL[Ü©õ€#kÖ²ûÛÖöÜZö'ıg?õ@71vIŠ=±w°ÑÇÚg³¬¡]Gà[&F2_s_ëÉ×+7¬š~åöÁ4dzðP`ÜÇòHYÚÞ¥¢
XØ?ª#n/ñFúuÓµ9=ßOß5ûäBì}â*IÊdÄ=É/%ÇÆ+q4âUWeÉ觚/ØK«¹Ð¿EýfkÝL;W¹X7ëº_»§Æ.ÆÙ1Ob×oK&Ça>^åØ«ïrüV`Èp±\VÉs@m²Åï®1, g=óXÃoî©2lë
5ô
,T0œÁÚY³Âû1KnI÷l¹-^@Ùlÿ°ùü»ëØ æ+n5-êl/ÀzÞÎÚb¹µE/C¥ÇHvÎ4Îíô=²Z}Ø9
¶\
VŠÐârlO³å2:E£eô©âí)%Ùš>³ÐbXÖÐct¡zÊÍìaªÏì4;Ëzõ<mQÓzõ0]ÏÛóŽX þq#>Jw(Å°|+«ÃJ©,kÑJZìÆv¯å*Ú§,G[«°¬åmeæ8ô²òMàwZáÎv*Í>é53õÞqÆ¡?
«ö`¹öÐ0ç«=fi©¥ka*Iœ0ŽêÂ\UaŸ0œ
+GÊìlDfÀøÍSK`sŠLÎ<Í¢àYé
>'ŸEWz³ŽÚoh|Õ~EÒÒ8Ù/|Xj.\ªt
¢¿rA¹O®Lþ³ècùIdö$Ƕ§FÆí<7¹ŒTôßÂ_¡ÅPGs¡¿},ôé§%¢C/GÏ$̧\Û][2uôùX¿òçàC}~DßD³ÆëLótG SE#Š-œ.Ô%q¬×cȧYd³6ÇZHèWÑI
Ýæ·ZDÖÒÕxùžCÈZ&ñ$o/.«ŠU¬«n*iéoå !y";&)4[©3µ,©óÈgÀÑW¶§ÄZÕäzd1ͬU-èn¡±fûÏ9Û7|ÅÏvÀvs§ßcÆlê§ÓlëÔlÆïD6ã/ÙuS±wDFÆ¢A4ç®·0M&Åc:pzëP@öÖní¡ÁZ~æòÎlkÐlk°xdûM-lеªqœÝ7ª$ãñBz~8M®©õd:ç9õÔ'W~h}¯:ÎIʳä
D<ËÛ°ÿÂrDþJ§€\ö9ab+rÀÔR%°pýN7ùÚmm&g{æ°yYr}å4¯Õô}ŠK
ÍQöÕ'GIÈ9SK
ðÜ9Û¶µþf3~fݪñþ$ï+€ØÐD&L-mÂWÞêl@JÙãiÑ?NÚN?·ÏÈG<c;þq :E
îY[й*€Žè'gÓ0-Óå Ó[wýãäDÈìDšxd3Š@6*4úµmŠ·^QËwxW
®gxÃZþ;û`\"äW
³ûѱ?ÿ9Þx+áá¬o%Â"ïÜ€íd/UL=²ÞYì%çßh=ymíoÁuÿŒ)ú0ÏVrÏ2Wòì-±€Öñª4Œ£YwIŠÜUŽ#P«©'A~V€³ZP"+àšþûYDdV&Ôèèð<²
ð
CðA¿ÿð2ðýèçÖÉF;è¥&_ÿÙÊ`!ðÑèçÖÉF;è¥&_vù®_PåþxÅVMLA~3»ýaU¬Æ`i xJR¢
jÅdÁвžôâE/zÒWñ &¯Æ/ÞŒ|3»Ûm)j%q'·oÞ÷ŸyoöÍš^úH{àÛêAlã#sy$¿©Âù©ñ|n>wËÔ&PKÕÑi3Ô£-ºé×âCæMc ÈfÂ]ÂŒù
±ãb!Q°n[ËìµÿÒÔ¬1¯
ÚPnVÏBìÎÆÂÚÄ
oòÄE"©ŠÈÎÂÜi$áÛÂù¯Ã="û2¯mÅõKæ§ôDd%z8,ì² °ûN¥1%þ
`3Ž"õ]LB;¶S'Š=A¶·Çq^ØRœ®¯CšóúêÚ~8ç+ÇsOVÄxÜEÝxHps#fHà-ÄãíÚ5òúLÿYÀí³[ßPÏ1Za @œ«b
Óp%X¹@i4%hä^pë¥]+ÄÛ8/Æ0R
ÇEÈ» ,éû1ý$+1ŠLvc*C-gÚ 0&J$å±Ú±HÁ©%oFÖ×Mãæ(ÏOǧ÷Vî¹֢®"jiB}LÊvbùùQVT1jLv£æãµ®SyÇ
5i©üÒ»6²ZŠ5±Úúì°=ÙqqÌ·Â|ßF°
!
_:ùMqMÏbo³g¯ýž{S Pmni
¶Ÿb6ØV÷YÐMwÌ-Ä83EëîZѺ0Êž9Ý-¬Fÿ V&ØGËÆÏåtÎR6jÄÑ
Õë<ÖÜï¿Ú6¥yeýiÙPÇÂo{õñ ñ8.ÉЯÞ
êöÇÞñä áQUŽªÙÕÿîëë&CöúºÉZýzJùëŽdhÑéEÒ
œüoÓŽÛfŠ#{Èž_œF/šiÚ¯Šyì÷±,]µËÒü2€ßébNÒRöÃxçºÓ'×/Ó²÷qëÇ#Ôýßú±J=õCGœjs[¬X?VéÛßÔG4ûGõ£üŽøûêÞEÞÔ®C¯Kã\>£NõÜÚ57îm¡Ò]aü»ÂØhNÚȧœç{¶ÃÁfø;òÕpÎ
WâŸ~ÊG -DdV&Ïppð<²
ð
CðA¿ÿð2ðr¥.±#"7ÛµYšŸÃ ÿyW`!ðqr¥.±#"7ÛµYšŸÃ "
ùA_p^?þxµVÏOA~3»ýÁ¶T[ȪPx(V4iC$DÃ+m€-¶k*W^H$þxðjôbŒhw/MŒx!^&úfv·ÝRêN&ïœyß|óÍìËh|@öø±÷8œÐE|DÏf²K2ÜN.f3¹Ì}]a1Š²æ5Óš°ëí@o¶#œã£øÐéµ®¥Ül&¬ 6_D¿H ÒË¢°É^±Y§f)-§kye*RÓ|ò=¿œü#ÿUÜe$ÂJìÌZœómïÁáãïM¥ýfê
:_DÉ{X,X\fA¡mXò!ŠÀßìz£ÂÉ(°
ÚVb£H±xÇExë`O®Ì,¯uÇ*׺qìµ.S©å9I ÕzŒ9T
QòØõ`qYß°°ô
1»mÑìÚªÉ<ÐÒÊ\¡WÇ3ÖÕÔjHYÖÒZV]ßÀtB®@;vÖ<
`<œœQ|F/ ðY¬³LAg°MvÜÄÆ`g]4¹ù|¶²ªæryŒï}15(̵kèurNC&Æ¥R%ãîÚUz*J~»J,.«$Ö=)öýŠÆ±FÇ~ú"y§Ñ¹ÖcÌurûÓÌ©>vòûFµ2æª H.ü~ºâò:LÈkh!ÖZÉBÃBRÊr×]¿þþ"dÊÜ_¬ÈÇßO5ö9:BT:IÑÚOÆ8FÑÙ2Ëwé£qù*Í¢mcQžc2
\'è/º Ú& ýƵë_xØŒIíõɪ3×}Ë[8vÁö-ÿEihyM?UTÍ*³E÷Üu«Lêè*s°ZTëP¿ÔÖt|ð|ÇA,
3ÿc²yo!€åc*xéä³i²NWEåEMLäA×Ù
M
}ÊÜxFW¢ôÖª®-Í3ô1~®³anž^O)CgðÂÓûâaôãØI4À³ú^ÈÿYê=úXcçñߌDdV&Ïppð<²
ð
CðA¿ÿð2ðe·ÔqÕvRLËH®çù ÿä`!ðÜe·ÔqÕvRLËH®çù 2ùA_p^ªþxµVÏOÔ@~3íîÊn· °ÈF~4HpYÍÆ ÁM$F4J$8¬P`#ìR£ÄxÜñßzÑwãÁÄ?bžx71Q ŸNK[·
mfßtæÍ÷œ÷Šóu THÉ0@²À®ZlmáJhMŒdþ<\4&Už0Å)ScÏ!Q¶õV+ãØ[çc"£é"ÌRB Á=lZ ûŹê¡üŸ
ê·µ«Å¹\Nµp
*ü8ßJh ¿uò< 2Œvæª8ßKÁ÷ÂÆiÉùÜ,@ÅB¹_&Æ_°ZÎ_ÉB¿ÝG «OpðŒ2
ëªÛgCÁ/ÇYÎpbWÓtIýD²ÔËA Î9>àqqhXw«O*QM, ÎpÏä:=âBè7çÍâPñŠ^ÐFKí&n×5377ÒŠõnäfÎA74B€!Ýx§9 ±%±×#ìubÍ$žkØØs·óM@º§,2Ý Ï"îLo@3Ø€E&ï"ܵHÝ-=coÜqþ(bAQÔ(NÇB.{×òÓÄËpôôxŒ48xU/©žß¢Æcÿs§~C'Üg
)§œ_7ÌüT~"gêI̳SÔ5¶¬*þHŸÄ=ÆÅ{#qκo'ÃeÏuïÙ}P¹`ZúÃZÄ©¥w ²^
öUÛÛŸlïÜ~ÅU~~vÂ~Y+(8ØNX(N(h[%ÔûpY]D;
Z/O
ËV³:(í²ì%WEœdVÝÛ¢NN9ÚEFiÉÑ+€'úßY\ ö^] ÃÛf±,4YZØ·ÌÐoô2ÌÐ:©ínkRNÏk¥%õ!õë¹Ä¿Íè#iukØä8±GzìUŠeêÕ[·2¥E¬o÷]oéá@}¬QÚ
Þ.Óú]%ðêôÖÖÓfî÷(ñ=í EwØTÁ¶§.Ò8Û±¿ë¥w|»ÿ=äUì=4üçÿ3ª;RJÛÚ:öþ$øÝ)nÃÁ2_o¿æ}ʬºÿ°ïëÝàDr\DÒ©wy€ŽR6:X4µì-sF/Œ²ã,bGºÅ[áÖ0ñµ9Ï]ÕjßåòµRqæßjåÅ1X §íZšð+Œ_µúÞ²ÿîgü
º|`âDdøu
èèð<²
ð
CðA¿ÿð2ðRßXêtnÌpftkqdüÿ.¢`!ð&ßXêtnÌpftkqdüeüLý®P,Èa!ôþxœX]hU>çÎl¶Ùn»»!Y#+QS4Ö (€I jÑD*ØM2Ú`²ÙÆtÛBD²Û->ø õ!hª}Dñ¡H)%ö¡ yñ!èC4fæzöîÿÝ4³»gîùŸsÎœçì"Th7Ø©
?L«|P~06)=nRzQX À3vLÁæHMPhtØœ}}nèxéŸoªæ<©û¡ °ŠåZaŠÁÒÔY:xA.&»ÉqÓØä#/tµž¹
â÷9ØÐÙš=âf×M¢ZLiÅ\¢ŽDX®&\Ç5:îóBú5rYãï«cßþ#+TÚJ*£5#cF<ÒkŒyy|,ŠEM\aœ°ìá»6ZS6tq]+j+×sJ³Aª@VICÅ<€×YWÌ÷Í/R~°ÍÈB£A#œÇßÊGµDù°·ò¶yn×E̺^ìîéb6áqhLÙ&Ìÿ¹|8ö#X0ì5ùª8...Šãš<ŠâÉïI;§aÕ|NvY·Š3CZtÙ`={óW±Þ#XÂ[&×DCÒ9æ³
óV'ücE~ìHY,&Àmm/í¿¬Å Ý^7à(<
;çÁ>òðAíÚV&£±øÄøäT€ßxsÌME§FÆc¶Iíï¶3ìq°s}Â%åF¡ökn8gZô;s~&ä°õ9Væhÿí&ù»ýÛoÒ{ÜÿEúéMÅFÑCðp8ÉŒâKíÆÊ%óòuZ£ýk=JÆ^wû¯]ô¬âîÜ;ès¬öŒ`LGöµ6Î>&å1ÍÞÓ31É_?Aetº3Ÿ³åŠAÁtþDÞËôÄ&§'dfóøÖÌŒkUUþb/× (d¹|8sÜ£WÉœ"ä=:/d~À€Ž9üÊèÊbèÖu8MnC'¹]dÏšú§ÂIòŽ[pã<Ëòü%Ï%OéõÕZÖÞñŒÜûV¡T²«~šÎa'9]d79CªÉVH`;9GH='Ab×ù¹ggùó=D'(ÞÿÝÅuxuT*S28ä¿âªÄf¡WäýüÛLà«{+'ÙPèe¬¬·*ÌÅvÙJâa«4Û>a»{)'ò
¹¿G+êÁJ³ý&±f{&ðœ±-ƶ£¢^4ÛOvfû%$Ð랧«4¶a=]þªV5¢0¿0ùW|ÎÆ\>Æêª^PWïàI¶[Í|ý]|ÊÅ]VŸþwl€³ž^ ¿Á{sG/3wd}b§Åës÷+cFtØl¿6}À»éߺŽs÷Æ
+š}e5ÙîÊé(²ûFÙ;ýaõdz§¶bœÓýô`6GǬQÙx$LDãqc82L2 9ÕÅûص1àýìlÄ»Z¿è~|ârŸRoúwzŸ®jk22t*£µôhaTk#€Qþó}Z~NbÖÒ;_°öÌXèþéø1±ìuÌ#%ÿ·ùÊ=ÌD ú%
èè ¿ -&ÿÿÿÿ\üÿÿEýÿÿµ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=P±¢
&
TNPPð &ÿÿÿÿ&TNPPEý\üpB úÿÿÿ"-ü-üÿÿÿ- ÿÿÿ
œŠEý\üûÜÿTimes New Roman4-.
ûÜÿTimes New Roman%-ð.
&ÿÿÿÿ ú"--þ£ýtýüûÂÿTimes New Roman4-ð.
2
Ñý¹üCODEC)--&* &ÿÿÿÿúý &ÿÿÿÿü²²²-ð ²²²}þ>ýûÂÿTimes New Roman%-ð.
Ò
2
m¢ýabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ÿþ>.þûÂÿTimes New Roman4-ð.
Ò
2
m=þabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}³ÿ>'ÿûÂÿTimes New Roman%-ð.
Ò
2
m6ÿabcd &ÿÿÿÿ &ÿÿÿÿ ²²²}Ú>NûÂÿTimes New Roman4-ð.
Ò
2
m]abcd &ÿÿÿÿûÂÿTimes New Roman%-ð.
Ò-2
þTransport De-Segmentation& -#1 &ÿÿÿÿ ²²²$Eýþ_ýþ_ýòÿýòÿýþ±ýþ{ý"þûÂÿ
Times New Roman4-ð.
ÄÒ2
þiýabcdabcdabcd &ÿÿÿÿ &ÿÿÿÿ ²²²Ë8ÂûÂÿTimes New Roman%-ð.
ðÿ2
|ñ
Decryption- &ÿÿÿÿ-$mee}²}²^e^eO &ÿÿÿÿü-ð $ÛGÝIec- $Ö9Ø;sqûÂÿ
Times New Roman4-ð.
Òÿ
2
éVabcd &ÿÿÿÿ &ÿÿÿÿ- $GI- $9;ûÂÿ
Times New Roman%-ð.
ðÿ
2
Vabcd &ÿÿÿÿ--ãúuý &ÿÿÿÿ- ÓáýUý- àîýQýûÂÿTimes New Roman4-ð.
ðÿ
2
Ãdýabcd &ÿÿÿÿ &ÿÿÿÿ- Ó»þ.þ- àÇþ+þûÂÿTimes New Roman%-ð.
Òÿ
2
Ã=þabcd &ÿÿÿÿ &ÿÿÿÿ- Ó³ÿ'ÿ- àÀÿ#ÿûÂÿTimes New Roman4-ð.
Òÿ
2
Ã6ÿabcd &ÿÿÿÿ &ÿÿÿÿ- Ó- à©ûÂÿTimes New Roman%-ð.
Òÿ
2
Ãabcd &ÿÿÿÿ--$ಀG¥GÃÁÐü²²²-ð ²²²ßYý*ý ²²²â3þþ ²²²â$ÿôþ ²²²ÝâÿûÂÿTimes New Roman4-ð.
Òÿ2
e<þ
SDU Header#,-- &ÿÿÿÿüÿÿÿ-ð ÿÿÿ]ÿ÷þ/ûÂÿTimes New Roman%-ð.
ÄÒ2
6ÿNKey #1- &ÿÿÿÿ-$£âÿº»ÿ¯»ÿ¯vÿvÿ»ÿ»ÿ÷þ§þ/ûÂÿTimes New Roman4-ð.
Ò°¡2
ãþJKey #2- ûÂÿTimes New Roman%-ð.
ÄÒ-*2
'þlKeys as received in the- ûÂÿTimes New Roman4-ð.
ÄÒ-2
qþl
H.245 channel-&TNPP &ÿÿÿÿ--ððûŒ"Systemn-ðyDd¶! ëèðB²
ð
Sð¯;A¿ÿð2ðãY%ž€'HØÓÞôÐâíÿ¿Ê»`!ð·Y%ž€'HØÓÞôÐâíÔðS;
þxœY[lU>·œömµ[h§Ü€
«\I³U4P°Ñš¡ÙîlŠ€£ >ø`"\"> ÑIÖxÃEÑ#5Ä/€xÀK0ñ(¡þsff;;³ÓÝY7Ìdçö9ßùþÎ9Q!z¹¡*Ži[#üæùëPñûu[-Z''UeHÙŽ{<¯"ÚÚU5!> ®Æù³Œ
£j§
!íL0FÞòìÞàE¬AVß+JCBŽKØši4éob"F;ÞyÀù:HFGG 2ÚÍ.tÍž×Î2$·ofÉKà#Ôlgnf;ÆÏWöZÿàrœèRâÐÆì¯ÎKžäÓmi × äcyïíS±ÞÛ#pU¬7%%xÊgxJ¡GI=m¶ùÅWÔå¡¥èA_!7ís@{üŠÙöcÍÌ;yŠpná}MgëÙ2ÚÄ~ÊlÏšoí5«KÅz©£çp3ŒYkèéßá!9)Šµâ°€¶¢Â_5pñëº<nÃZ
p×ñ_ú3ùNêhêã:|
°Eµrz¯ajxåâ>FvAvÜv{H-žÓªÅ)IèUÅôPFQ³mSÓ#ÌuÐ5hŠk€Ék<jbíô±k5ÏÐê©·hµ± Nåê£óëäȱү~¯3¯9²ÃÇ×b<ý.¥{èZ¹ÕÏ€ÆbuÝ¥š
P·REil(~W;arua»[^úKª¥ ]Ž7 -IÆX7`^Ñ
Åòhœßé5çŒKÍÔ±Çú)xÓgõx__D3£m÷K¯á&Ål+¢IÀÐd'ŒiÕäŸxÇÒ>Ôc M&O|7³ðGÔÎoéeØt£u.ÇòØ:Š ºÆ:dÄ:F¯ÂÉÎã-ÖÁ±ªsýÃ]xÜÖÐS=8NÞEûdÜÈõHŠÓž?7©µJön5Àî%f¯âsìIŒåÛ4b¶$ÖõÆu,Š¶{AZI~`Ä
)BHe"pC'pa€_@bEz Ÿ|ñ"š¥å 'Ïã}dé#BsfJlÐ""F
Ørec87?JØ>RÛØ*ßã;éÛø)lÓLÚS©xM«±^<WEÓø-JG¹eÜSrº<0â0®Œ|ÿ{2ev
ý*áÉÃx3UñiÓ¹C ä×ÃÎø]ÀAl€x!ý=ì`ã
÷HZ&©2xUH(鬪€1œMX'ŠÅ~iPJgÁÓÓ`lÕdx9ÚDÂÆœ©eÔžÒö&ãY¥£rB3=G¥\Ž1àÌ*Á¿Ð6vT==ŸæÉtY1RFäÛðìÚë@Ñ¿ã ±~)º2]oUø
tu ;F£± ñ[1¶ÓÀ+øÔXåUŒÌ»ñëž1zw~ü
#oô<Ieóô$^M`ç÷)ôqÒ c§ö|ô8o'ßá?µñ,H1«xµš<D(yÓÑ¿>»e ±În×Yi$e$5jx¯6W?Âp%+ÉÝdÄ«Eäÿ~E
¡T
u_d@b_Ìßص©ìÒÇfîöi±ÐVëùj#¿ ô+!ÌÙ¿¿
³«žxÕtï}Š¿
]A«ÐiègknY}Ó@.£ßñœ*¡3áXpO:©g²²ÖØ]Ç×W4FL°á©0÷>/%ÏùHÔ¥û¹ÄÂ)×µrÿBYKRl®+Ê<JBÌÄÍïªfÜ*³zDëéÄÄW%WO«}ITMW¡öÜŸÕ ±®ŠmJ*IP¶P6w67'kf)»Ëößdûž¬1u)·Ž$@Üwªrvع¢TZs«.S£åŒGÇØV²£"ãõô<OqmµÄ>ÛZ\ælëúÞK{r2}ëø?ÃÅRlzc6ÒWœzŒüU/3
-àåjùE!"p5®"ü.w
WJŽW(ïñ?C¡_ÐDs;Æ
Ž!Ïèè £
U&ÿÿÿÿWordMicrosoft WordA
û-ûÿTimes New Romanl- §êO'ûœÿŒ"Arial²-2
\'AGRQ404'ÿÿiV
-2
V
AGCF40)'ÿÿAäé4-2
ö4AxxQ%%4'ÿÿÑ64-2
C4AIRR00'ÿÿk4£ûµÿ"ArialNe-2
£A(
.., AliasK2*&'ÿÿx@8ûÎÿ"Arial-
2
BAa'ÿÿk-2
A,
.)K'ÿÿx8Ô-2
BÔA'ÿÿk â-(2
âA[Not Authenticated]6*2****&***'ÿÿcÃØ©ûµÿŒ"Arial-@2
ç©#A cryptoTokens [
(cryptoEPPwdEncr)
]**....**.*K**..222:.2.*K-'ÿÿ ú"-xêx
ú"-ðü- úÿÿÿ"-$õûyõg
y-ðüÿÿÿ-ð ú"->þ>
-ðü- úÿÿÿ"- $
-?
Pä?-ð -ð ú"-HêH
-ðü- úÿÿÿ"- $õZûHõ7
H-ð -ð ú"-
-ðü- úÿÿÿ"- $óë-ð -ð*¶§³-@2
¶³#A cryptoTokens [
(cryptoGKPwdEncr)
]**....**.*K**..:62:.2.*K--'ÿÿ,Ôh
-2
áh
AxCF%0)'ÿÿ8m
ÙÈ-U2
èÈ1A(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-@Ds;š
Ž!Ÿèè ø
U&ÿÿÿÿWordMicrosoft Word:ûŒSystem
-ûÿTimes New Roman*íwÀgïw(
€
- åHûœÿŒ"ArialV
2!íw*íwÀgïwV
2
-2
U:GRQ404'ÿÿb
I
-2
I
:GCF40)'ÿÿ;ßâ(-2
ï(:xxQ%%4'ÿÿÌ/(-2
<(:IRR00'ÿÿk~ûµÿ"ArialR
2!íw*íwÀgïwR
2
-2
~:(
.., AliasK2*&'ÿÿw#8ÜûÎÿ"ArialB
;!íw*íwÀgïwB
;
-
2
BÜ:a'ÿÿkæ÷-2
÷:,
.)K'ÿÿwê8°-2
B°:'ÿÿk{ œ-(2
œ:[Not Authenticated]6*2****&***'ÿÿ>ßûµÿŒ"Arial
9!íw*íwÀgïw
9
-@2
î#: cryptoTokens [
(cryptoEPPwdHash)
]ÿ**....**.*K**..222:.6**.K'ÿÿú-rÝrþú-ðü-ú-$éðré`
r-üÿÿÿ- ðú-8ø8
-ðü--$'8Iß8-- ðú-BÝBþ-ðü--$éSðBé0
B-- ðú-þøþ
-ðü--$ìþßþ-- ð Ï-@2
#: cryptoTokens [
(cryptoGKPwdHash)
]**....**.*K**..:62:.6**.K-'ÿÿ&Í\
-2
Ú\
:xCF%0)'ÿÿ8P
Ù£-U2
è£1:(
, GatekeeperIdentifier,
) [Not Authenticated]K:**&********K6*2****&***'ÿÿ-HDs;š
Ž!Ÿèè } U&ÿÿÿÿWordMicrosoft Word:
û-ûÿTimes New Roman,- §žNõÿûœÿŒ"Arial²-2
[õÿ:GRQ404'ÿÿià
$
-2
$
:GCF40)'ÿÿA²è-2
õ:xxQ%%4'ÿÿ6-2
C:IRR00'ÿÿqøgûµÿ"ArialNe-2
!g:(
.., AliasK2*&'ÿÿ~>ÄûÎÿ"Arial±-
2
HÄ:a'ÿÿqÈß-2
!ß:,
.)K'ÿÿ~Ë>-2
H:'ÿÿq\ Š-(2
!Š:[Not Authenticated]6*2****&***'ÿÿ ú"-x®xÇ ú"-ðü- úÿÿÿ"-$¹¿x¹gáx-ðüÿÿÿ-ð ú"->É>ã-ðü- úÿÿÿ"-$×-Ò?×P¯?-ð-ð ú"-)ó'q
-ð ú"-%É%ã-ðü- úÿÿÿ"-$×Ò&×7¯&-ð-ð,æ
Ó6
-2
à6
:xCF%0)'ÿÿ>ß-U2
ð1:(
, GatekeeperIdentifier,
) [Not Authenticated]S<%%*%%*%*%*%S<*<**%*%%%*'ÿÿkôÏ{ûÿŒTimes New Roman4-:2
à{: CryptoTokens[
(cryptoEPCert)
]<%*.*7*.%. S%%*.*73<%%S'ÿÿ' -82
š:CryptoTokens[
(cryptoGKCert)
]<%*.*7*.%. S%%*.*AA<%%S-'ÿÿ ú"-KûK
-ð-83Djb8Ë7ÌXX t6&ÿÿÿÿÍôÿÿ@øÿÿø &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù
&
TNPPð &ÿÿÿÿ&TNPP@øÍôžQ úÿÿÿ"-ü- &ÿÿÿÿ &ÿÿÿÿ ú"-
%û>ýdúö--ð,û@dúÀ ú"-búÎú&ûÎú--ð'ÿÿ--@öÀÍôü- $Ëô`úËôhúëôhúëô`ú $õ`úõhú+õhú+õ`ú $Kõ`úKõhúkõhúkõ`ú $õ`úõhú«õhú«õ`ú $Ëõ`úËõhúëõhúëõ`ú $ö`úöhúöhúö`ú --ð'ÿÿ--@öÀÍôü- $Ëô ûËô(ûëô(ûëô û $õ ûõ(û+õ(û+õ û $Kõ ûKõ(ûkõ(ûkõ û $õ ûõ(û«õ(û«õ û $Ëõ ûËõ(ûëõ(ûëõ û $ö ûö(ûö(ûö û --ð'ÿÿ &ÿÿÿÿ ú"-å>ý$ö--ðì@$À ú"-"ÎúæÎú--ð'ÿÿ--@öÀÍôü- $Ëô Ëô(ëô(ëô $õ õ(+õ(+õ $Kõ Kõ(kõ(kõ $õ õ(«õ(«õ $Ëõ Ëõ(ëõ(ëõ $ö ö(ö(ö --ð'ÿÿ--@öÀÍôü- $ËôàËôèëôèëôà $õàõè+õè+õà $KõàKõèkõèkõà $õàõè«õè«õà $ËõàËõèëõèëõà $öàöèöèöà --ð'ÿÿûÿTimes New Roman1-.
æÎú 2
ôúÍ÷PGûÿTimes New Roman5-ð d,MM2
ôúøn-10 0ûÿTimes New Roman(-ð.
d,MM
2
ôúœûPn50 ú"-5ýÎútüöÕÿ6ùþ
÷EÎúö--ðûŒ"Systemn-ðD@|À ú"-z[ø>[ø--ð'ÿÿ ú"-ÕÿFþþüE®ÿýúûÿTimes New Roman1-.
>[ø 2
ýý÷PGûÿTimes New Roman5-ð d,MM2
ýDøn-10 0ûÿTimes New Roman(-ð.
d,MM 2
kÿøENûÿTimes New Roman4-ð d,MM 2
kÿløk0ûÿTimes New Roman(-ð.
d,MM 2
÷CUûÿTimes New Roman4-ð d,MM 2
b÷n0ûÿTimes New Roman(-ð.
d,MM
2
}ùCU+ûÿTimes New Roman4-ð.
d,MM 2
ŽœûCUûÿTimes New Roman(-ð d,MM 2
Žün0ûÿTimes New Roman4-ð.
d,MM 2
Ž-øCUûÿTimes New Roman(-ð d,MM2
Žøn-10 0 &ÿÿÿÿ5ý®ÿtüýú--ð-ð<ý@tüÀ ú"-rü=ý6ý=ý--ð'ÿÿûÿTimes New Roman1-.
6ý=ý 2
ýœûPGûÿTimes New Roman5-ð @ 2
ýün0ûÿTimes New Roman(-ð.
@
2
ý-þCU+ &ÿÿÿÿûÿTimes New Roman4-ð.
@ 2
üCUûÿTimes New Roman(-ð +U2
ýn-10 0ûÿTimes New Roman4-ð.
+U 2
Sÿ.ýENûÿTimes New Roman(-ð +U 2
Sÿ|ýk0---ð_þ@4ýÀ ú"-Yþ]ø2ý]ø--ð'ÿÿü- $CøHþ]øQþwøHþ]øþ --ðOü@$ûÀ ú"-Iü]ø"û]ø--ð'ÿÿü- $Cø8ü]øAüwø8ü]øtü --ð_@ÔÿÀ ú"-Òÿ]øY]ø--ð'ÿÿü- $CøH]øQwøH]ø ú"--%=÷D=÷4íû4íû÷-- $Óûèíûñüèíû$ --ððOü@$ûÀ ú"-"ûíûIüíû--ð'ÿÿü- $Óû8üíûAüü8üíûtü --ð_þ@4ýÀ ú"-2ýmýYþmý--ð'ÿÿü- $SýHþmýQþýHþmýþ --ð_@ÔÿÀ ú"-ÒÿmýYmý--ð'ÿÿü- $SýHmýQýHmý ú"--%mýDmýÔ]øÔ]ø÷-- $Cøè]øñwøè]ø$ &ÿÿÿÿ--%û®dú--ðð,û@dúÀ ú"-bú>&û>--ð'ÿÿ--@À=ü- $;`ú;hú[hú[`ú ${`ú{húhú`ú $»`ú»húÛhúÛ`ú $û`úûhúhú`ú $;`ú;hú[hú[`ú ${`ú{húhú`ú --ð'ÿÿ--@À=ü- $; û;(û[(û[ û ${ û{(û(û û $» û»(ûÛ(ûÛ û $û ûû(û(û û $; û;(û[(û[ û ${ û{(û(û û --ð'ÿÿ &ÿÿÿÿ &ÿÿÿÿ ú"-å®$--ðì@$À ú"-">æ>--ð'ÿÿ--@À=ü- $; ;([([ ${ {(( $» »(Û(Û $û û(( $; ;([([ ${ {(( --ð'ÿÿ--@À=ü- $;à;è[è[à ${à{èèà $»à»èÛèÛà $ûàûèèà $;à;è[è[à ${à{èèà --ð'ÿÿ &ÿÿÿÿûÿTimes New Roman1-.
æ> 2
ôú=CUûÿTimes New Roman5-ð +U2
ôún-10 0ûÿTimes New Roman(-ð.
+U
2
ôú-Cn@0 ú"-5ý>tüÕÿŠþõE>--ð-ðL@À ú"-ËFË--ð'ÿÿ ú"-5ýtüm--ð<ý@tüÀ ú"-rüµ6ýµ--ð'ÿÿ ú"-Õÿ¶ þEmûÿTimes New Roman1-.
6ýµ 2
ýmCUûÿTimes New Roman5-ð +U2
ýÂn-10 0ûÿTimes New Roman(-ð.
+U 2
kÿD\ûÿTimes New Roman4-ð +U 2
kÿêk0ûÿTimes New Roman(-ð.
+U 2
}PGûÿTimes New Roman4-ð +U 2
Än0ûÿTimes New Roman(-ð.
+U
2
íCU+ûÿTimes New Roman4-ð.
+U 2
Ž-PGûÿTimes New Roman(-ð +U 2
Žtn0ûÿTimes New Roman4-ð.
+U 2
ŽPGûÿTimes New Roman(-ð +U2
Žän-10 0ûÿTimes New Roman4-ð.
+U 2
ý-CUûÿ
¡¢£€¥Š§š©ª«¬®¯°±Ç·Žµ¶žÄ¹º»ÆœŸ¿ÀÁÂÃþÿÿÿïþÿÿÿîÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíþÿÿÿðþÿÿÿ=ýÿÿÿóôõö÷øùúûüýþÿTimes New Roman(-ð +U 2
ýn0ûÿTimes New Roman4-ð.
+U
2
ý CU+ûÿTimes New Roman(-ð.
+U 2
PGûÿTimes New Roman4-ð +U2
dn-10 0ûÿTimes New Roman(-ð.
+U 2
SÿD\ûÿTimes New Roman4-ð +U 2
Sÿúk0--ð-ð_þ@4ýÀ ú"-YþÍ2ýÍ--ð'ÿÿü- $³HþÍQþçHþÍþ --ðOü@$ûÀ ú"-IüÍ"ûÍ--ð'ÿÿü- $³8üÍAüç8üÍtü --ð_@ÔÿÀ ú"-ÒÿÍYÍ--ð'ÿÿü- $³HÍQçHÍ ú"--%D4]4]÷-- $Cè]ñwè]$ --ððOü@$ûÀ ú"-"û]Iü]--ð'ÿÿü- $C8ü]Aüw8ü]tü --ð_@ÔÿÀ ú"-ÒÿÝYÝ--ð'ÿÿü- $ÃHÝQ÷HÝ ú"--%ÝDÝÔÍÔÍ÷-- $³èÍñçèÍ$ûpÿTimes New Roman1-.
YÝ62
ßø¡üCiphertext Stealing in ECB mode`(HH@0(@H($P(@@((HH$(H$X``$pHH@--%€ù€ùÙýUþÙýUþbý-- $oþqýUþhý;þqýUþ5ý--%âýË âýË bý-- $å qýË hý± qýË 5ý --ðð-ðaþ@=ýÀ ú"-;ýÝ[þÝ--ð'ÿÿü- $ÃJþÝSþ÷JþÝþûpÿTimes New Roman1-.
[þÝ2
Éù÷EncryptXH@0HH(ûpÿTimes New Roman5-ð.
+U2
ÉùDecrypth@@0HH( &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð-ðL@Djb8Ë7ÎXX ÿ6&ÿÿÿÿÀôÿÿ@øÿÿù &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù
&
TNPPð &ÿÿÿÿ&TNPP@øÀô¹Q úÿÿÿ"-ü- &ÿÿÿÿ &ÿÿÿÿ ú"-
&û1ýeú
ö--ð-û@eúÀ ú"-cúÁú'ûÁú--ð'ÿÿ--@öÀÀôü- $ŸôaúŸôiúÞôiúÞôaú $þôaúþôiúõiúõaú $>õaú>õiú^õiú^õaú $~õaú~õiúõiúõaú $ŸõaúŸõiúÞõiúÞõaú $þõaúþõiúöiúöaú --ð'ÿÿ--@öÀÀôü- $Ÿô!ûŸô)ûÞô)ûÞô!û $þô!ûþô)ûõ)ûõ!û $>õ!û>õ)û^õ)û^õ!û $~õ!û~õ)ûõ)ûõ!û $Ÿõ!ûŸõ)ûÞõ)ûÞõ!û $þõ!ûþõ)ûö)ûö!û --ð'ÿÿ &ÿÿÿÿ ú"-æ1ý%
ö--ðí@%À ú"-#ÁúçÁú--ð'ÿÿ--@öÀÀôü- $Ÿô!Ÿô)Þô)Þô! $þô!þô)õ)õ! $>õ!>õ)^õ)^õ! $~õ!~õ)õ)õ! $Ÿõ!Ÿõ)Þõ)Þõ! $þõ!þõ)ö)ö! --ð'ÿÿ--@öÀÀôü- $ŸôáŸôéÞôéÞôá $þôáþôéõéõá $>õá>õé^õé^õá $~õá~õéõéõá $ŸõáŸõéÞõéÞõá $þõáþõéöéöá --ð'ÿÿûÿTimes New Roman-.
çÁú 2
õúÀ÷PGûÿTimes New Roman1-ð d,MM2
õúøn-10 0ûÿTimes New Roman-ð.
d,MM
2
õú°ûPn50 ú"-6ýÁúuüöe)ùÿx÷FÁú
ö--ðûŒ"Systemn-ðM@
À ú"-øGø--ð'ÿÿ ú"-6ý¡ÿuüðú--ð=ý@uüÀ ú"-sü0ý7ý0ý--ð'ÿÿ ú"-e9þÿüF¡ÿ
ðúûÿTimes New Roman-.
7ý0ý 2
ýð÷PGûÿTimes New Roman1-ð d,MM2
ý7øn-10 0ûÿTimes New Roman-ð.
d,MM 2
ûÿøENûÿTimes New Roman1-ð d,MM 2
ûÿ_øk0ûÿTimes New Roman-ð.
d,MM 2
÷CUûÿTimes New Roman1-ð d,MM 2
U÷n0ûÿTimes New Roman-ð.
d,MM
2
pùCU+ûÿTimes New Roman1-ð.
d,MM 2
µ°ûCUûÿTimes New Roman-ð d,MM 2
µün0ûÿTimes New Roman1-ð.
d,MM 2
µ øCUûÿTimes New Roman-ð d,MM2
µuøn-10 0ûÿTimes New Roman1-ð.
d,MM 2
ý°ûPGûÿTimes New Roman-ð d,MM 2
ý÷ûn0ûÿTimes New Roman1-ð.
d,MM 2
ý þ0@ûÿTimes New Roman-ð.
d,MM 2
üCUûÿTimes New Roman1-ð d,MM2
õün-10 0ûÿTimes New Roman-ð.
d,MM 2
ãÿ!ýENûÿTimes New Roman1-ð d,MM 2
ãÿoýk0--ð-ðý@5ýÀ ú"-ýPø3ýPø--ð'ÿÿü- $6øýPøýjøýPøÄý --ðPü@%ûÀ ú"-JüPø#ûPø--ð'ÿÿü- $6ø9üPøBüjø9üPøuü --ð`@dÀ ú"-bPøZPø--ð'ÿÿü- $6øIPøRjøIPø
ú"--%0÷E0÷5àû5àûø-- $Æûéàûòúûéàû% --ððPü@%ûÀ ú"-#ûàûJüàû--ð'ÿÿü- $Æû9üàûBüúû9üàûuü --ðý@5ýÀ ú"-3ý`ýý`ý--ð'ÿÿü- $Fýý`ýýzýý`ýÄý --ð`@dÀ ú"-b`ýZ`ý--ð'ÿÿü- $FýI`ýRzýI`ý
ú"--%`ýE`ýÕPøÕPøø-- $6øéPøòjøéPø% &ÿÿÿÿ--&û¡eúz--ðð-û@eúÀ ú"-cú1'û1--ð'ÿÿ--@À0ü- $.aú.iúNiúNaú $naúniúiúaú $®aú®iúÎiúÎaú $îaúîiúiúaú $.aú.iúNiúNaú $naúniú|iú|aú --ð'ÿÿ--@À0ü- $.!û.)ûN)ûN!û $n!ûn)û)û!û $®!û®)ûÎ)ûÎ!û $î!ûî)û)û!û $.!û.)ûN)ûN!û $n!ûn)û|)û|!û --ð'ÿÿ &ÿÿÿÿ &ÿÿÿÿ ú"-æ¡%z--ðí@%À ú"-#1ç1--ð'ÿÿ--@À0ü- $.!.)N)N! $n!n))! $®!®)Î)Î! $î!î))! $.!.)N)N! $n!n)|)|! --ð'ÿÿ--@À0ü- $.á.éNéNá $nánééá $®á®éÎéÎá $îáîééá $.á.éNéNá $náné|é|á --ð'ÿÿ &ÿÿÿÿûÿTimes New Roman-.
ç1 2
õú0CUûÿTimes New Roman1-ð d,MM2
õú
n-10 0ûÿTimes New Roman-ð.
d,MM
2
õú Cn@0 ú"-6ý1uülÿþÜF1
--ð-ðM@
À ú"-ðGð--ð'ÿÿ ú"-6ýuü`--ð=ý@uüÀ ú"-sü 7ý --ð'ÿÿ ú"-lÿ þìF
`ûÿTimes New Roman-.
7ý 2
ý`CUûÿTimes New Roman1-ð d,MM2
ýµn-10 0ûÿTimes New Roman-ð.
d,MM 2
ÿuD\ûÿTimes New Roman1-ð d,MM 2
ÿÑk0ûÿTimes New Roman-ð.
d,MM 2
pPGûÿTimes New Roman1-ð d,MM 2
·n0ûÿTimes New Roman-ð.
d,MM
2
àCU+ûÿTimes New Roman1-ð.
d,MM 2
µ PGûÿTimes New Roman-ð d,MM 2
µgn0ûÿTimes New Roman1-ð.
d,MM 2
µPGûÿTimes New Roman-ð d,MM2
µ×n-10 0ûÿTimes New Roman1-ð.
d,MM 2
ý CUûÿTimes New Roman-ð d,MM 2
ýun0ûÿTimes New Roman1-ð.
d,MM
2
ý CU+ûÿTimes New Roman-ð.
d,MM 2
PGûÿTimes New Roman1-ð d,MM2
Wn-10 0ûÿTimes New Roman-ð.
d,MM 2
êþ
D\ûÿTimes New Roman1-ð d,MM 2
êþák0--ð-ðöý@5ýÀ ú"-îýÂ5ýÀ--ð'ÿÿü- $šßýÂèýÜßýÃþ --ðPü@%ûÀ ú"-JüÀ#ûÀ--ð'ÿÿü- $Š9üÀBüÚ9üÀuü --ð[@ÅÀ ú"-ŪS§--ð'ÿÿü- $DšMÂD§ ú"--% E 5P5Pø-- $6éPòjéP% --ððPü@%ûÀ ú"-#ûPJüP--ð'ÿÿü- $69üPBüj9üPuü --ðöý@5ýÀ ú"-5ýÐîýË--ð'ÿÿü- $²ÞýÌèýæàýÊþ --ð`@ÊÀ ú"-ÊÊXÎ--ð'ÿÿü- $ŽJÎRèHÐ
ú"--%ÐEÐÕÀÕÀø-- $ŠéÀòÚéÀ%--vþ«øÄýí÷--ðð{þ@ÄýÀ ú"-ÂýVøuþVø--ð'ÿÿ--@±øÀí÷ ú"-þë÷þ«ø--ð'ÿÿ--îþ@pþÀ ú"-nþUøèþUø--ð'ÿÿü- $;ø×þUøàþoø×þUøÿ --ð@È÷ÀW÷ ú"-þW÷þÀ÷--ð'ÿÿü- $±÷4þº÷þ±÷þí÷þûÿTimes New Roman-.
þÀ÷ 2
BþöCUûÿTimes New Roman1-ð d,MM2
Bþqön-20 0 ú"--rþ·ýÀýùü--ðð-ðwþ@ÀýÀ ú"-ŸýYýqþYý--ð'ÿÿ--@œýÀùü ú"-þ÷üþ·ý--ð'ÿÿ--êþ@lþÀ ú"-jþXýäþXý--ð'ÿÿü- $>ýÓþXýÜþrýÓþXýÿ ú"--%Uø¯Žú¯Žúþ¶üþ-- $§ü5þ°üþ§üþãüþ --ððôÿ@lÿÀ ú"-lÿÊìÿÉ--ð'ÿÿü- $¯ÝÿÉæÿãÝÿÉ ú"--ÆN--ððÍ@À ú"-ŠÇŠ--ð'ÿÿ--@ÀN ú"-kLk--ð'ÿÿ ú"-Æ( j--ðÍ@À ú"-ËÇË--ð'ÿÿ--@. Àj ú"-khk( --ð'ÿÿ ú"-Ï€]ÿ--ðÖ@À ú"-ïÐï--ð'ÿÿûÿTimes New Roman-.
Ðï 2
ãÿCUûÿTimes New Roman1-ð d,MM 2
8n0ûÿTimes New Roman-ð.
d,MM 2
0@ûÿTimes New Roman1-ð.
d,MM 2
CUûÿTimes New Roman-ð d,MM2
Õn-20 0ûpÿTimes New Roman1-ð.
d,MM62
ßø¡üCiphertext Stealing in CBC mode`(HH@0(@H($P(@@((HH$(H$```$pHH@---ðëÿ@lÿÀ ú"-jÿ«åÿ«--ð'ÿÿü- $Ôÿ«ÝÿÅÔÿ« --ð@=À ú"-k7k«--ð'ÿÿü- $&
/k&Qbk --ð@"À» ú"-kk¹--ð'ÿÿü- $
kQGkûpÿTimes New Roman-.
k¹2
Éù÷EncryptXH@0HH(ûpÿTimes New Roman1-ð.
d,MM2
ÉùDecrypth@@0HH( &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð-ðt2DcÔ$$8áXX +&ÿÿÿÿÀôÿÿHøÿÿ5¢ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù
&
TNPPð &ÿÿÿÿ&TNPPHøÀôZu úÿÿÿ"-ü- &ÿÿÿÿûpÿTimes New Roman-.
+2
çø¡üZero Padding in CFB modeX@0H$P@HH(HH$(H$`P`$pHH@ûpÿTimes New Roman5-ð.
d,MM2
Ñù÷EncryptXH@0HH(ûpÿTimes New Roman(-ð.
d,MM2
ÑùDecrypth@@0HH( ú"-
ûûÁúèö7þÉÿÇûûÉÿîöûÿTimes New Roman4-ð.
d,MM 2
QûÈøPGûÿTimes New Roman(-ð d,MM2
Qûùn-10 0ûÿTimes New Roman4-ð.
d,MM 2
P·üCUûÿTimes New Roman(-ð d,MM 2
Pýn0ûÿTimes New Roman4-ð.
d,MM 2
YøCUûÿTimes New Roman(-ð d,MM2
Yóøn-10 0--ðûŒ"Systemn-ðý@ûÀ ú"-ý+ùû(ù--ð'ÿÿü- $ùùü+ùýEùùü,ù5ý --ð¬ÿ@òýÀ ú"-òý-ù€ÿ(ù--ð'ÿÿü- $ùÿ)ùÿCùÿ(ùÑÿ --ðý@ûÀ ú"-û8þý8þ--ð'ÿÿü- $þðü8þùüRþðü8þ,ý ú"--çýù5ýÅø--ððìý@5ýÀ ú"-3ý&ùæý&ù--ð'ÿÿ--@ùÀÅø ú"-ýÃøýù--ð'ÿÿ--@øÀø ú"-ýøýø--ð'ÿÿü- $xøšýøýxøtýŽøýûÿTimes New Roman-.
ýø 2
«ýúôCUûÿTimes New Roman5-ð d,MM2
«ýOõn-20 0 ú"--åýþ3ýÑý--ðð-ðëý@4ýÀ ú"-2ý0þåý0þ--ð'ÿÿ--@þÀÚý ú"-ýØýýþ--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ5þüäüßú- ÿÿÿþ2ü:ý>ûûÿTimes New Roman-.
ýþ 2
ËýxûENûÿTimes New Roman5-ð 0H 2
ËýÆûk0 &ÿÿÿÿ --ðð-ð@®ýÀü ú"-ýüýŠý--ð'ÿÿü- $ý§ý ýýýsýÓýý ú"--%+ùèþúèþúýßúý-- $>þÎÿ6þÎÿ6þîÿ>þîÿ $>þ6þ6þ.>þ. $>þN6þN6þn>þn $HþHþhþhþ $þþšþšþ $ÈþÈþèþèþ $ÿÿ(ÿ(ÿ $HÿHÿhÿhÿ $ÿÿšÿšÿ $ÈÿÈÿèÿèÿ $(( $HHhh $qmymyMqM $q-y-y
q
$qíÿyíÿyÎÿqÎÿ $qÎÿqÆÿpÆÿpÎÿ $PÎÿPÆÿ0Æÿ0Îÿ $ÎÿÆÿðÿÆÿðÿÎÿ $ÐÿÎÿÐÿÆÿ°ÿÆÿ°ÿÎÿ $ÿÎÿÿÆÿpÿÆÿpÿÎÿ $PÿÎÿPÿÆÿ0ÿÆÿ0ÿÎÿ $ÿÎÿÿÆÿðþÆÿðþÎÿ $ÐþÎÿÐþÆÿ°þÆÿ°þÎÿ $þÎÿþÆÿpþÆÿpþÎÿ $PþÎÿPþÆÿ>þÆÿ>þÎÿ --ððÿ@éýÀ ú"-çý6þÿ6þ--ð'ÿÿü- $þÿ6þÿPþÿ6þŸÿ &ÿÿÿÿ ú"--û8þÃúÈûûÿTimes New Roman-.
ÿ6þ 2
JûžüPGûÿTimes New Roman5-ð 0H 2
Jûÿün0-- $?þÌú7þÌú7þìú?þìú $?þû7þû7þ,û?þ,û $?þLû7þLû7þlû?þlû $Mþ~ûMþûmþûmþ~û $þ~ûþûþûþ~û $Íþ~ûÍþûíþûíþ~û $
ÿ~û
ÿû-ÿû-ÿ~û $Mÿ~ûMÿûmÿûmÿ~û $ÿ~ûÿûÿûÿ~û $Íÿ~ûÍÿûíÿûíÿ~û $
~û
û-û-~û $M~ûMûmûm~û $rcûzcûzCûrCû $r#ûz#ûzûrû $rãúzãúzÌúrÌú $rÌúrÄúiÄúiÌú $IÌúIÄú)Äú)Ìú $ Ìú ÄúéÿÄúéÿÌú $ÉÿÌúÉÿÄú©ÿÄú©ÿÌú $ÿÌúÿÄúiÿÄúiÿÌú $IÿÌúIÿÄú)ÿÄú)ÿÌú $ ÿÌú ÿÄúéþÄúéþÌú $ÉþÌúÉþÄú©þÄú©þÌú $þÌúþÄúiþÄúiþÌú $IþÌúIþÄú?þÄú?þÌúûÿTimes New Roman(-ð.
0H 2
Pû5ÿ0@ &ÿÿÿÿ--ûUÆú€óÎÿ[ÎÿªûÿTimes New Roman4-ð.
0H 2
VûCUûÿTimes New Roman(-ð d,@2
VûÙn-10 0ûÿTimes New Roman4-ð.
d,@ 2
UsPGûÿTimes New Roman(-ð d,@ 2
Uºn0ûÿTimes New Roman4-ð.
d,@ 2
^ZPGûÿTimes New Roman(-ð d,@2
^¡n-10 0--ðð-ðý@ûÀ ú"-ýâûä--ð'ÿÿü- $Èýâ
ýüýâ=ý --ð±ÿ@úýÀ ú"-úýâ©ÿä--ð'ÿÿü- $Êÿä£ÿþÿäÖÿ --ðý@ûÀ ú"-ûôýô--ð'ÿÿü- $Úõüôþü õüô1ý ú"--ìý?:ý--ððñý@:ýÀ ú"-8ýâëýâ--ð'ÿÿ--@EÀ ú"-ýý?--ð'ÿÿ--@\ÀÓ ú"-ýÓýT--ð'ÿÿü- $E§ýNýEsýýûÿTimes New Roman-.
ýT 2
žý¢ÿCUûÿTimes New Roman5-ð d,@2
žý÷ÿn-20 0 ú"--êýK 8ý--ðð-ðøý@AýÀ ú"-?ýëòýë--ð'ÿÿ--@Z À ú"-ýýT --ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ:þLéü- ÿÿÿþî?ýúûÿTimes New Roman-.
ýT 2
Ðý4ENûÿTimes New Roman5-ð 0H 2
Ðýk0 &ÿÿÿÿ --ðð-ð@jÀR ú"-ýRýb--ð'ÿÿü- $S«ý\ýSwýý $úÓÿòÓÿòóÿúóÿ $úòò3ú3 $úSòSòsús $ ) ) $I I i i $ © © $É É é é $
)
)
$I
I
i
i
$
©
©
$É
É
é
é
$ )) $-h5h5H-H $-(5(5- $-èÿ5èÿ5Óÿ-Óÿ $-Óÿ-Ëÿ"Ëÿ"Óÿ $ÓÿËÿâ
Ëÿâ
Óÿ $Â
ÓÿÂ
Ëÿ¢
Ëÿ¢
Óÿ $
Óÿ
Ëÿb
Ëÿb
Óÿ $B
ÓÿB
Ëÿ"
Ëÿ"
Óÿ $
Óÿ
Ëÿâ Ëÿâ Óÿ $ Óÿ Ëÿ¢ Ëÿ¢ Óÿ $ Óÿ Ëÿb Ëÿb Óÿ $B ÓÿB Ëÿ" Ëÿ" Óÿ $ Óÿ ËÿúËÿúÓÿ --ðÿ@îýÀ ú"-ìýòÿò--ð'ÿÿü- $Øÿòÿ ÿòÃÿ ú"--ûìÃú|ûÿTimes New Roman-.
ÿò 2
JûlCUûÿTimes New Roman5-ð d,0 2
JûÁn0-- $óÌúëÌúëìúóìú $óûëûë,ûó,û $óLûëLûëlûólû $ ~û û! û! ~û $A ~ûA ûa ûa ~û $ ~û û¡ û¡ ~û $Á ~ûÁ ûá ûá ~û $
~û
û!
û!
~û $A
~ûA
ûa
ûa
~û $
~û
û¡
û¡
~û $Á
~ûÁ
ûá
ûá
~û $~ûû!û!~û $&cû.cû.Cû&Cû $&#û.#û.û&û $&ãú.ãú.Ìú&Ìú $&Ìú&ÄúÄúÌú $ý
Ìúý
ÄúÝ
ÄúÝ
Ìú $œ
Ìúœ
Äú
Äú
Ìú $}
Ìú}
Äú]
Äú]
Ìú $=
Ìú=
Äú
Äú
Ìú $ý Ìúý ÄúÝ ÄúÝ Ìú $œ Ìúœ Äú Äú Ìú $} Ìú} Äú] Äú] Ìú $= Ìú= Äú Äú Ìú $ýÌúýÄúóÄúóÌúûÿTimes New Roman(-ð.
d,0 2
Pûé 0@--%êFüžFüžýyý-- $j©ýsýjuýŠý &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ<þøëü^ö- ÿÿÿþ±÷AýœöûÿTimes New Roman4-ð.
d,0 2
Òý÷öENûÿTimes New Roman(-ð 0H 2
ÒýE÷k0 &ÿÿÿÿ --ðð-ð@;öÀÝõ ú"-ýÛõý5ö--ð'ÿÿü- $$öŠý-öý$örý`öý &ÿÿÿÿ ú"-üÿÿÿ-ð ÿÿÿ5þÊäü- ÿÿÿþl:ýxûÿTimes New Roman-.
ý5ö 2
Ëý²ENûÿTimes New Roman5-ð 0H 2
Ëýk0 &ÿÿÿÿ --ðð-ð@óÀ{ ú"-ýyýí--ð'ÿÿü- $ܱýåýÜ}ýý &ÿÿÿÿ&TNPP &ÿÿÿÿ--ð89DÏ^1À5ll up&ÿÿÿÿFõÿÿ@øÿÿÆ
z &ÿÿÿÿ&ÿÿÿÿTNPP8Q=Pù|
&
TNPPð &ÿÿÿÿ&TNPP@øFõ: úÿÿÿ"-ü- &ÿÿÿÿûpÿTimes New Roman-.
+2
ßø¡üZero Padding in OFB modeX@0H$P@HH(HH$(H$hPOle
ÿÿÿÿÿÿÿÿÿÿÿÿœPIC
prÿÿÿÿŸLMETAÿÿÿÿÿÿÿÿÿÿÿÿÀøCompObjquÿÿÿÿÜht8a x&ÿÿÿÿWordMicrosoft WordV
ûŒSystem
-ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC
]!íw*íwÀgïwC
]
- 2
'ô V
Endpoint 8.....ûÿŒ"Arial
U!íw*íwÀgïw
U
-
2
'SV
A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2
@
V
GatekeeperA..*....'ÿÿ--ú-?S
¯-ð-3G
º#-2
ËV
GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2
å²V
Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥
-ð-ú-_ËÕG
-ð-RŸáS
ûÿTimes New Roman*íwÀgïw
-2
òS
V
POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--þÿ
ÿÿÿÿ ÀFMicrosoft Word Picture
MSWordDocWord.Picture.8ô9²qÿÿÿÿÿÿÿÿt8að x&ObjInfoÿÿÿÿÿÿÿÿÿÿÿÿÞObjectPooltwÿÿÿÿLç)œLç)œOlePres000ÿÿÿÿÿÿÿÿÿÿÿÿßWordDocumentvxÿÿÿÿŒÿÿÿÿWordMicrosoft WordV
ûŒSystem
-ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC
]!íw*íwÀgïwC
]
- 2
'ô V
Endpoint 8.....ûÿŒ"Arial
U!íw*íwÀgïw
U
-
2
'SV
A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2
@
V
GatekeeperA..*....'ÿÿ--ú-?S
¯-ð-3G
º#-2
ËV
GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2
å²V
Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥
-ð-ú-_ËÕG
-ð-RŸáS
ûÿTimes New Roman*íwÀgïw
-2
òS
V
POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--þÿà
òùOh«+'³Ù0 ¬žÈÔàð
4@L
Xdlt|äG. ThomÜ¥hWà eCj
8
j
jj
j
°
°
°
°
°
°
º
°
§
KÄ
Ä
Ä
Ä
Ä
"""2444=q}
ò
XJ §
"Ä
^"""§
2j
j
Ä
Ä
222"j
Ä
Ä
2D¯ÄŒ
¢
j
j
j
j
"222
Gatekeeper
Gateway
Endpoint A
POTS B
Endpoint X
€Ð/¥à=Š
§Ðš^©ªª2(aµM?ÿÿÿÿÿÿ20(p YZÿÿÿ2(èà¥Nÿÿÿ.0$
Ñÿÿÿ20(%*!£Kÿÿÿÿ0 0&$ðï20( šYHÿÿÿ00&$.Ž-³00&U#jK;J:
()*4@BCøòøòððððíðððëuU]]uDauD]a
*+34@ABCûÿðøðöø#ðöøoðöögðöø#ðööûÿð×òZ
K@ñÿNormala "A@òÿ¡"Default Paragraph Font!*7:CCÿÿÿÿ ÿÿCCCZŸðP²â
Dÿ@\\BAHARI\JF3-2-D13-4SINe00:winspool\\BAHARI\JF3-2-D13-4SI\\BAHARI\JF3-2-D13-4SIpsXXLetter8¥dC ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''\\BAHARI\JF3-2-D13-4SIpsXXLettereeeeeee8¥ôE ÿÿÿÿ4ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ''''KTimes New RomanSymbol"Arial
Univers (W1)Arial"ÁÐh! G. ThomjtogaSummaryInformation(ÿÿÿÿyÿÿÿÿüŽDocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿØ1TableÿÿÿÿòSummaryInformation(|ÿÿÿÿÈþÿÿÿþÿÿÿ
þÿÿÿþÿÿÿþÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿNormal®jtoga#2Microsoft Word for Windows 95@FÃ#@@žÄŒ@þJÄŒþÿÕÍÕ.+,ù®0šHPdlt|ä
Acme Corp.þÿà
òùOh«+'³Ù0`$pHH@ûpÿTimes New Roman1-ð.
d,MM2
Éù÷EncryptXH@0HH(ûpÿTimes New Roman-ð.
d,MM2
ÉùDecrypth@@0HH( &ÿÿÿÿ ú"-
zûû¹úèöx8þ·Èûx û·ïöûÿTimes New Roman1-ð.
d,MM 2
IûÈøPGûÿTimes New Roman-ð Øy2
Iûùn-10 0ûÿTimes New Roman1-ð.
Øy 2
>žüCUûÿTimes New Roman-ð Øy 2
>
ýn0ûÿTimes New Roman1-ð.
Øy 2
GøCUûÿTimes New Roman-ð Øy2
Gôøn-10 0--ðûŒ"Systemn-ðý@yûÀ ú"-ý+ùyû(ù--ð'ÿÿü- $ùñü+ùúüEùñü,ù-ý --ð@êýÀ ú"-êý-ù)ù--ð'ÿÿü- $ùy)ùCùy)ùµ --ðÿü@yûÀ ú"-wû8þùü8þ--ð'ÿÿü- $þèü8þñüRþèü8þ$ý ú"--ßýù-ýÅø--ððäý@-ýÀ ú"-+ý&ùÞý&ù--ð'ÿÿ--@ùÀÅø ú"-ýÃøýù--ð'ÿÿ ú"-Ýýþ+ýÑý--ðãý@,ýÀ ú"-*ý0þÝý0þ--ð'ÿÿ--@þÀÚý ú"-ýØýýþ--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ+üÚþ×ú- ÿÿÿ*ü0ÿ6ûûÿTimes New Roman-.
ýþ 2
ÁÿpûENûÿTimes New Roman1-ð Øy 2
ÁÿŸûk0 &ÿÿÿÿü-ð $?þŒ7þŒ7þÜ?þÜ $?þü7þü7þ?þ $?þ<7þ<7þ\?þ\ $IþrIþziþziþr $þrþz©þz©þr $ÉþrÉþzéþzéþr $ ÿr ÿz)ÿz)ÿr $IÿrIÿziÿziÿr $ÿrÿz©ÿz©ÿr $ÉÿrÉÿzéÿzéÿr $ r z)z)r $IrIzizir $r[z[z;r; $rzzûrû $rÛzÛzŒrŒ $rŒrŽqŽqŒ $QŒQŽ1Ž1Œ $ŒŽñÿŽñÿŒ $ÑÿŒÑÿŽ±ÿŽ±ÿŒ $ÿŒÿŽqÿŽqÿŒ $QÿŒQÿŽ1ÿŽ1ÿŒ $ÿŒÿŽñþŽñþŒ $ÑþŒÑþŽ±þŽ±þŒ $þŒþŽqþŽqþŒ $QþŒQþŽ?þŽ?þŒ --ðð-ð@áýÀ ú"-áý6þ4þ--ð'ÿÿü- $þq4þzNþq4þ &ÿÿÿÿ ú"--|û8þ»úÈûûÿTimes New Roman-.
4þ 2
BûžüPGûÿTimes New Roman1-ð Øy 2
Bûÿün0-- $?þÄú7þÄú7þäú?þäú $?þû7þû7þ$û?þ$û $?þDû7þDû7þdû?þdû $MþvûMþ~ûmþ~ûmþvû $þvûþ~ûþ~ûþvû $ÍþvûÍþ~ûíþ~ûíþvû $
ÿvû
ÿ~û-ÿ~û-ÿvû $MÿvûMÿ~ûmÿ~ûmÿvû $ÿvûÿ~ûÿ~ûÿvû $ÍÿvûÍÿ~ûíÿ~ûíÿvû $
vû
~û-~û-vû $MvûM~ûm~ûmvû $r[ûz[ûz;ûr;û $rûzûzûúrûú $rÛúzÛúzÄúrÄú $rÄúrŒúiŒúiÄú $IÄúIŒú)Œú)Äú $ Äú ŒúéÿŒúéÿÄú $ÉÿÄúÉÿŒú©ÿŒú©ÿÄú $ÿÄúÿŒúiÿŒúiÿÄú $IÿÄúIÿŒú)ÿŒú)ÿÄú $ ÿÄú ÿŒúéþŒúéþÄú $ÉþÄúÉþŒú©þŒú©þÄú $þÄúþŒúiþŒúiþÄú $IþÄúIþŒú?þŒú?þÄúûÿTimes New Roman-ð.
Øy 2
Hû5ÿ0@ &ÿÿÿÿ &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ+È÷Úþö- ÿÿÿj÷0ÿvöûÿTimes New Roman1-ð.
Øy 2
Áÿ°öENûÿTimes New Roman-ð Øy 2
Áÿþök0 &ÿÿÿÿ --ðð-ð@÷õÀFõ ú"-ÿDõÿñõ--ð'ÿÿü- $àõÿéõÿàõhÿöÿ --ð@ùÀÐ÷ ú"-ÿÎ÷ÿ
ù--ð'ÿÿ--@žúÀRù ú"-ÿPùÿ²ú--ð'ÿÿü- $¡úÿªúÿ¡úhÿÝúÿ ú"- ÿørÿñ÷-
% ø
ÿ øýøý-- $zø¡ýøýzømý¶øý --ðð@ÆýÀü ú"-ÿüÿÀý--ð'ÿÿ ú"-ü- ÿêüqÿÈü-
%ØüqÿØüý€ýý-- $ýšýýýýtýÑýýûÿTimes New Roman-.
ÿÀý 2
°ý<÷SGûÿTimes New Roman1-ð 02
°ý÷n-10 0ûÿTimes New Roman-ð.
0 2
ŸýLüSGûÿTimes New Roman1-ð 0 2
Ÿýün0 &ÿÿÿÿûÿTimes New Roman-ð.
02
6L÷Note: S\@$9# HûÿTimes New Roman1-ð 0 2
6ÐøiûÿTimes New Roman-ð 0p2
6ëøF is the result of repetitive encryption (i.e., permutations) of the IV $1 $@9 *92@$# @+ *9@9$#$#@9 9@9*@@$#@@ +$ 8 @9+c@$9#$@@2* @+ $@8 +\ &ÿÿÿÿ--ûå¿ú4~œ~ìœ;ûÿTimes New Roman1-ð.
0 2
OûCUûÿTimes New Roman-ð FØy2
Oûin-10 0ûÿTimes New Roman1-ð.
FØy 2
DPGûÿTimes New Roman-ð FØy 2
DKn0ûÿTimes New Roman1-ð.
FØy 2
MëPGûÿTimes New Roman-ð FØy2
M2n-10 0--ðð-ðý@ûÀ ú"-ýwût--ð'ÿÿü- $]÷üwý÷üx3ý --ð@ðýÀ ú"-ðýyu--ð'ÿÿü- $[uu» --ðý@ûÀ ú"-}ûÿü--ð'ÿÿü- $jîü÷üîü*ý ú"--åýÏ3ý--ððêý@3ýÀ ú"-1ýräýr--ð'ÿÿ--@ÕÀ ú"-ýýÏ--ð'ÿÿ ú"-ãýÛ1ý--ðéý@2ýÀ ú"-0ý|ãý|--ð'ÿÿ--@êÀ& ú"-ý$ýä--ð'ÿÿ &ÿÿÿÿ ú"-üÿÿÿ- ÿÿÿ1Ôàþ#- ÿÿÿv6ÿûÿTimes New Roman-.
ýä 2
ÇÿŒENûÿTimes New Roman1-ð Øy 2
Çÿ
k0 &ÿÿÿÿü-ð $ÂÂââ $"" $BBbb $xµµx $ÕxÕõõx $ x 5 5 x $U xU u u x $ x µ µ x $Õ xÕ õ õ x $
x
5
5
x $U
xU
u
u
x $
x
µ
µ
x $Ÿ
aÆ
aÆ
AŸ
A $Ÿ
!Æ
!Æ
Ÿ
$Ÿ
áÆ
áÆ
Ÿ
 $Ÿ
Ÿ
ºœ
ºœ
 $
Â
º}
º}
 $]
Â]
º=
º=
 $
Â
ºý ºý  $Ý ÂÝ ºœ ºœ  $  º} º}  $] Â] º= º=  $  ºýºý $ÝÂݺœºœÂ $ººÂ --ðð-ð@çýÀ ú"-çý--ð'ÿÿü- $fww³ &ÿÿÿÿ ú"--ûÁúûÿTimes New Roman-.
2
HûCUûÿTimes New Roman1-ð Øy 2
HûYn0-- $ÊúÊúêúêú $
û
û*û*û $JûJûjûjû $|ûû¹û¹|û $Ù|ûÙûùûù|û $ |û û9 û9 |û $Y |ûY ûy ûy |û $ |û û¹ û¹ |û $Ù |ûÙ ûù ûù |û $
|û
û9
û9
|û $Y
|ûY
ûy
ûy
|û $
|û
û¹
û¹
|û $Ÿ
aûÆ
aûÆ
AûŸ
Aû $Ÿ
!ûÆ
!ûÆ
ûŸ
û $Ÿ
áúÆ
áúÆ
ÊúŸ
Êú $Ÿ
ÊúŸ
Âúµ
Âúµ
Êú $
Êú
Âúu
Âúu
Êú $U
ÊúU
Âú5
Âú5
Êú $
Êú
Âúõ Âúõ Êú $Õ ÊúÕ Âúµ Âúµ Êú $ Êú Âúu Âúu Êú $U ÊúU Âú5 Âú5 Êú $ Êú ÂúõÂúõÊú $ÕÊúÕÂúµÂúµÊú $ÊúÂúÂúÊúûÿTimes New Roman-ð.
Øy 2
Nû 0@ &ÿÿÿÿ &ÿÿÿÿ-üÿÿÿ-ð ÿÿÿ1àþc- ÿÿÿ¶6ÿÂûÿTimes New Roman1-ð.
Øy 2
ÇÿüENûÿTimes New Roman-ð Øy 2
ÇÿJk0 &ÿÿÿÿ --ðð-ð@CÀÿ ú"-ÿÿÿ=--ð'ÿÿü- $,¢ÿ5ÿ,nÿhÿ --ð@\À ú"-ÿÿV--ð'ÿÿ--@À ú"-ÿÿþ--ð'ÿÿü- $í¢ÿöÿínÿ)ÿ ú"- ÿ_xÿ=-
%UÿUýÕý-- $ƧýÏýÆsýý --ðð@ÀÒ ú"-ÿÐÿ--ð'ÿÿ ú"-ü- ÿ6wÿ-
%$wÿ$ýðý-- $á®ýêýázýýûÿTimes New Roman-.
ÿ 2
¶ýSGûÿTimes New Roman1-ð F02
¶ýÏn-10 0ûÿTimes New Roman-ð.
F0 2
ÄýSGûÿTimes New Roman1-ð F0 2
Äýßn0 &ÿÿÿÿ &ÿÿÿÿ&TNPP &ÿÿÿÿ--ðð-ðDDgVÞü0šš {5&ÿÿÿÿ#öÿÿŸùÿÿ» Ÿ &ÿÿÿÿ&ÿÿÿÿTNPP8Q=PùS
&
TNPPð &ÿÿÿÿ&TNPPŸù#ö úÿÿÿ"-ü- &ÿÿÿÿ ú"-5B( ÎÎÎÿÿÿ|øñãÇ>- ÎÎÎÿÿÿ
þçšý¬úûÿŒ"ArialT-.
2
Aþ'þActual PayloadQ>%E>K>?D?D5B( ÎÎÎÿÿÿ>Çãñø|ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ-ð ÎÎÎÿÿÿþ9šýàûÿŒ"Arial-ð.
d,MM2
AþüPadK>Düÿÿÿ-ð ÿÿÿþ» šý;ûÿŒ"ArialT-ð.
d,MM 2
AþÕLDûÿ"Arial-ð.
d,MM12
@ú]öPadding as prescribed by RTPK>>??>>8 >%>88&>>> >8QDK --ððûŒ"Systemn-ð@ ÀÇú ú"-pûÅúpû --ð'ÿÿü- $ÜúVûÓúpûÜúû úpû $u û~ pûu Vû± pûûÿŒ"Arial-.
pû (2
7ûRTP Payload (M octets)QDKK>> D>E%]E>%?%>& --ð-ð@ºÀÕú ú"-ŠüÓúŠüŽ--ð'ÿÿü- $äúüÛúŠüäúÀüšúŠü $£Àü¬Šü£üߊü --ð@À ú"-Šü Šü--ð'ÿÿü- $üŠüÀüߊü $úÀüŠüúü6Šü --ð@ Àc ú"-ŠüaŠü --ð'ÿÿü- $rüiŠürÀü6Šü $} Àü Šü} ü¹ ŠüûÿŒ"Arial-.
Šü 2
ü2ÿM-L]&DûÿŒ"ArialT-ð.
d,MM2
üÈL-1D&>ûÿŒ"Arial-ð.
d,MM 2
üÌ1>û ÿ"ArialT-ð.
d,MM2
ÿ¢Pad value can be@56066505565û ÿ"Arial-ð.
d,MM2
µderived by some56 0565005P5û ÿ"ArialT-ð.
d,MM"2
jconventional means056056556P5560 ú"-üÿÿÿ-ð ÿÿÿþ©ú¥ýu÷ûÿŒ"Arial-ð.
d,MM2
ýÈ÷
RTP headerQDKE>>E>+ûÿŒ"ArialT-ð.
d,MM 2
Lþ·÷PKûÿŒ"Arial-ð.
d,MM2
\ÿ}÷P=1KA> &ÿÿÿÿ&TNPP &ÿÿÿÿ--ðð-ð@Dt8a Ú x&ÿÿÿÿWordMicrosoft WordV
ûŒSystem
-ü-ú-ºÊú-ðüÿÿÿ-®Õûÿ"ArialC
]!íw*íwÀgïwC
]
- 2
'ô V
Endpoint 8.....ûÿŒ"Arial
U!íw*íwÀgïw
U
-
2
'SV
A<-'ÿÿüÿÿÿ-ú-©$R-ð-ð|/]-2
@
V
GatekeeperA..*....'ÿÿ--ú-?S
¯-ð-3G
º#-2
ËV
GatewayA..<.*'ÿÿ-ú-R§Él-ð-FÔw-2
å²V
Endpoint X8.....8'ÿÿú-EM 2× -ðú-8Ý Ê -ðú-Ö Û¥
-ð-ú-_ËÕG
-ð-RŸáS
ûÿTimes New Roman*íwÀgïw
-2
òS
V
POTS B.<3.8'ÿÿ-ú-Ü.¯Œ-ð--@ ÄÐàìø ,
HT`
lxäITU-T H.235 RecommendationTU-G. Thom. T. TNormal.dot Pekka Pessi3kkMicrosoft Word 8.0n@ÒIk@Àl,õŒ@Œ_ëÓ)œ@x£2ç)œ+2õþÿÕÍÕ.+,ù®DÕÍÕ.+,ù®DocumentSummaryInformation8ÿÿÿÿÿÿÿÿÿÿÿÿäCompObjÿÿÿÿÿÿÿÿÿÿÿÿjÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿLhp š°ž
ÀçäNRC/CSL}-jITU-T H.235 RecommendationTitle 6>
_PID_GUIDäAN{C94FF6E1-95E7-11D1-9D2F-0000C04BE66A}þÿ
ÿÿÿÿ ÀFMicrosoft Word Document
MSWo
!"#$%&'()*+,-./0123456789:;<þÿÿÿþÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÜ
[$@ñÿ$NormalmH N@N Heading 1$$€ð€x5;>*CJOJQJkHäF@F Heading 2
$€ð€x5CJOJQJkHäH@H Heading 3
$€ð€<56CJOJQJkHäF@F Heading 4
$€ð€<5CJOJQJkHäB@B Heading 5
$€ð€<CJOJQJkHäF@F Heading 6
$€ð€<6CJOJQJkHä>@> Heading 7
$€ð€<OJQJkHäB@B Heading 8
$€ð€<6OJQJkHäF @F Heading 9
$€ð€<6CJOJQJkHä<A@òÿ¡<Default Paragraph FontFþOòF¥Normal$€
Ƨ4ÁOJQJkHäFþOFAddress€
ÆByCJOJQJkHäHþOHAn #$€Ê€D
Ƨ4ÁCJOJQJkHä,þO",Annex $€P5B*NþOA2Nannex a"dû
ÆnÐ U"&OJQJkHä*@*TOC 4X
ÆÀ!
DþODAnnex_#$€Ð€D
Æñà%OJQJkHä:þO: Annex_Ref$
Ƨ4ÁNþONAnnex_Title$€€D
Ƨ4Á5CJ(þOQ(
Appendix_#LþOaLAppendix_Ref
Ƨ4Áñà%OJQJkHäTþOqTAppendix_Title
Ƨ4Áñà%CJOJQJkHäJþOJASN.1$€
Ƨ4Á5CJOJQJkHäDþO±ÂD
ASN.1 Cont€B*CJOJ QJ kHämH 2þO±Ò2ASN.1 Cont. $€xþOÑâxASN.1 Cont. T.124/ú
Æ&O Û
gì
xš4ÀB*CJOJQJkHäPþOÒP
ASN.1 ital$
Ƨ4Á6CJOJQJkHäjþOñjASN.1 title_ital4 $€ª
Æ(§4Á
T7n¥ÜJ
ž&CJ,þO,asn1!$OJQJkHä|þO"|asn1.8ptF"$
Æ>hÐ8 pØ @šxàH°èPž 5CJOJQJkHä8þO8attr#$€h
ÆpOJQJkHä:þOB:attr2$$h
ÆxOJQJkHä:þOR:attr3%$
Æ OJQJkHä8þO8Blanc&$$$CJOJQJkHä>þOr>bullet list'ÿÿB*OJ
QJ
kHäBþOBcall($$€ã
Æ6OJQJkHä4þO4CCI)$$$€ÇOJQJkHä<þO¢<CCITT|ISO/IE*CJOJQJkHäBþOB Chapter_#+$$$$€ÀOJQJkHä>þO±>
Chapter_title
,$€ð€ª5dþOd Citations,-¥ªdð€[€µ
ƪSü¥O6CJOJQJkHä0þOâ0clause.CJOJQJkHä<þOò<clause5thlvl/CJOJQJkHähþOhCorrection begin+0$$œ €h&d
Ƨ4Á 56B*@þO@Correction end1$$d&d\þO\Correction Separator2$ €ð€ð&d56LþO!2LCorrection Separator Begin3$PþO!BPCorrection Separator End4$d&dNþORN dash list58Täý
ÆT5CJOJQJkHä4þO4Data
6
Æ7CJOJQJkHäJþOrJ def texte7$€
Ƨ4ÁOJQJkHä^þo!r^ def title)8$$æü€9€@&
Æñà%CJOJQJkHäLþOL
Defect report 9$€x5>*CJ$OJQJkHä:þO¢:Description
:7€xCJmH\þoA²\Doc Heading$;$$€h€@&
Ƨ4ÁB*OJQJkHä2þOÂ2docname<CJOJQJkHä8þOÒ8
docNameCap=CJOJQJkHäFþOâFentry>€ð
ÆÐ 5CJOJQJkHämH JþOáòJentry contents?€
Æp@à5DþODenumlev1"@$§sþ€V
Ƨ4Á(þO(enumlev2A4(þO"(enumlev3BÁ>þO2>EquationC€Á€ð
Æ4ñà%<þO<FigureD$€ð€à
Ƨ4ÁBþOBFigure_#E$$€7€qCJOJQJkHäJþOJ
Figure_LegendF$€q
Ƨ4ÁCJVþOrV
Figure_RemarkG$$d9ÿ€
ÆCJOJQJkHäTþOTFigure_Title!H$$€x€Ð
Ƨ4Á5CJ4þO4footI$CJOJ QJ kHämH 2 @¢2FooterJ$€x
ÆàÀ!<&@¢±<Footnote ReferenceCJEHXþOÂXfootnote texL$
Ælª<ÈTCJOJ QJ kHämH N@ÒN
Footnote TextM$€
Ƨ4ÁCJ@þOâ@GDMON$€
Ƨ4ÁOJ QJ kHäDþOÑòD
GDMO Cont.
O
ƪ5CJOJ QJ kHä6þOÁ6GDMO indent
Pôü5<þO<GDMO TemplatQCJOJQJkHä:þO":ibal-endcmtRCJOJQJkHä>þO2>ibal-newtxtSpCJOJQJkHä@þOB@ibal-proposaT CJOJQJkHä8þOR8ibal-ratUpCJOJQJkHä@þOb@ibal-severitV CJOJQJkHä6þOqr6Index TitleWOJQJkHä*þOq*Index_TitleXHþOHInfodocY$$§Yû
ƧCJOJQJkHä<þO¢<ISO documentZCJOJQJkHä8þO²8
iso2column[CJOJQJkHä:þOÂ: iso3rdlvl\ÐCJOJQJkHä:þOÒ: isoalpha1]ÐCJOJQJkHä>þOâ>isoalphalis^ÐCJOJQJkHä<þOò<
isoannexl1_pCJOJQJkHä>þO>isoannexl1I`$CJOJQJkHä<þO<
isoannexl2a CJOJQJkHä:þO":isoannexstrbCJOJQJkHä:þO2: isobulletc`CJOJQJkHä:þOB: isoclausedÐCJOJQJkHä<þOR<
isoclause0eÐCJOJQJkHä4þOb4isodeff CJOJQJkHä6þOr6isodefngÐCJOJQJkHä8þO8
isoendbullhCJOJQJkHä6þO6 isofont10iCJOJQJkHä4þO¢4isofont9jCJOJQJkHä8þO²8
isomarginskCJOJQJkHä2þOÂ2isonotelCJOJQJkHä4þOÒ4isoparasmCJOJQJkHä8þOâ8isoromannÐCJOJQJkHä8þOò8
isosectionoCJOJQJkHä>þO>isosubclauspÐCJOJQJkHäþOisotabsXq
ÆS `à à" %@&`'À*à+-`B MÀNàOQ@S`TUZ`]`f@wàwy zCJOJQJkHä4þO"4isotitlerCJOJQJkHä,þO2,ItemsCJOJQJkHäjþOqBjjustified bullet list$88þ
Æ85B*CJOJQJkHä:þOAR:justified dash listuDþObDl0v$ìäý€ð
ÆìB*CJOJ
QJ
kHä8þOr8l1
w$ì€ðB*CJOJ
QJ
kHäFþOFlevel 3 headingx$<OJQJkHä0þO0Line y$€OJQJkHä<þO<listzÐþ€d
ÆÐOJQJkHäDþO²Dlistitem{$
Ƨ4ÁOJQJkHäFþOÂF memo list|Ðþ€d
ÆÐOJQJkHä:þOÁÒ:memo list 2}€ð
ÆÐ.þOQâ.
new dash list~dþodNormal after title$€9@&
Æñà%5CJOJQJkHäD@D
Normal IndentÐdðOJQJkHä:þO:Note$€q
Ƨ4ÁCJ8þO8Object
Æ7CJOJQJkHäRþO2RoNormal$€ð
Ƨ4ÁB*CJOJ QJ kHämH 2þOB2p $€ðB*CJOJ
QJ
kHä:)@¢Q:Page NumberB*CJOJQJkHäDþObDPart¥[ù€Ç
Æü¥CJOJQJkHä þOQ Part_#DþOaDPart_Ref
Ƨ4Áñà%OJQJkHäLþOqòL
Part_Title
Ƨ4Áñà%CJOJQJkHäDþO¢Dprec&€7/q.q:CJOJQJkHä2þO²2prose $€xOJQJkHäFþOÂFQlistÜ$÷€Ç
ÆÁÜCJOJQJkHäLþOL
Question_#$$$€Ð
Æñà%OJQJkHä\þO\Question_Title$$$€ð
Æñà%5CJOJQJkHä\þO\Question_Title/Date$$$€
Æà%OJQJkHä\þOò\Question_Title/Ref$$$€
Æñà%OJQJkHä>þO>Rec #$$€Ð
Ƨ4Á52þO 2 Rec Title $€ðCJBþOBRec_#$$$€Ð
Æñà%OJQJkHä4þOB 4Rec_CCITT_#$$54þO R 4 Rec_ISO_#
Æ
§4Á2þO1 2 Rec_Title€ð5CJRþORRec_Title/Date$$$€
Æà%OJQJkHä:þOa r :
Rec_Title/Ref€5CJ,þO ,Ref$ŬþdLÿVþOVRef_Doc"$æü€ã
Ƨ4Á6CJOJQJkHäTþO² TRef_Text"$æü€
Ƨ4ÁCJOJQJkHäDþO² D Ref_Title$$$€XCJOJQJkHäþO1 Rep_#&þOa & Rep_Title0þOq 0Rep_Title/Date.þO ò .
Rep_Title/Ref þO1 Res_#¡&þOa & Res_Title¢0þOq 0Res_Title/Date£.þO 2
.
Res_Title/Ref€6þOR
6sc21box¥$CJOJQJkHä<þOb
<
sc21numberŠ$CJOJQJkHäLþOL Section #§$$$Â>ú
ÆÂOJQJkHä:þOq
2 :
Section title š$€ð64þOq
2 4Section_sous ©$€ð\þO¢
\
Section_Titleª€
Ƨ4Á5CJ OJQJkHänþO²
nSingle Space PostScr«$€
Ƨ4Á5<B*OJ QJ kHämH @þOAÂ
@ star list¬$bòþ
Æ8bZþOZstitre_p$dð€Z€Ž
ƪSü¥O5CJOJQJkHäRþOâ
RStyle-®$jd>€T
Ƨ4Ád$+16CJPþOò
Pstyles¯Éý€
Ƨ4Á5>*CJOJQJkHä:þO:Subject
°
Æ7CJOJQJkHä.þO.table±OJQJkHämH Nþo!"NTable header²$€à€@& 6OJQJkHämH @þO@Table_#³$$€7€qCJOJQJkHäJþOJ Table_finŽ$€
Ƨ4ÁOJQJkHäLþOLTable_Legendµ$€q€à
Ƨ4ÁCJLþObL
Table_Text!¶$$€€
Ƨ4ÁCJ:þOar:Table_Text_Body
·€€8þOq8Table_Text_Firstž€:þOq:Table_Text_Last ¹$€6þOa¢6Table_Text2
º$€€RþObRTable_Title!»$$€x€q
Ƨ4Á5CJBþOaÂBTable2_Text
Œ€P€POJQJkHämH 2þOÁÒ2Table3_Text
œ€€šþOšTitle 1sŸ$
&Fÿhþ€à€ð>ÆTh)>*CJOJQJkHä*þOá*Title 2¿€>*&þOñ&Title 3À€àXþOXtitre-p$Ádð€Z€Ž
ƪSü¥O5CJOJQJkHäBþO2Btoc 0Â$€
Æ&>*CJOJQJkHäL@LTOC 1Àx
ÆÛšÀ!
5CJOJQJkHämHnH6@6TOC 3ÄÛ
ÆnÀ!
mHnH@@@TOC 5$Å$€
Ƨ4Áý%
.(a).TOC 6Æ
ÆÀ!
CJ2@2TOC 7Ç$°€x
ÆÀ!
2@2TOC 8È$x€x
ÆÀ!
2@2TOC 9É$@€x
ÆÀ!
:þO¢:verytempnotÊCJOJQJkHä6'@¢±6Comment ReferenceCJRþOÂRCouv Rec TitleÌ$$€ð5CJ$OJQJkHäHþOÒH
Couv Rec #
Í$€5CJ OJQJkHäDþOâD Couv NoteÎ$€È
ÆnOJQJkHäZþoòZforeword(Ï$$æü€ž@&
Ƨ4ÁCJOJQJkHä$þO
$ParaЀxmH8@
8Comment TextÑOJQJkHä6@"
6Header
Ò
ÆàÀ!
5>*CJ6B@2
6 Body TextÓ€xOJQJkHäþoB
HeadingcÔ
&Fÿ@& >ÆT
2þOR
2HeadÕ$€x
ÆŠmH 1@b
List NumberlÖ
&Fÿhþ€x>ÆTh.:@1B:TOC 2
×$ô€CJOJQJkHä|þo!
|aaacØ
&Fÿ@& >ÆT
,þO¢
,codeOJQJkHämHnH0@¢
List BulletpÚ
&Fÿ
Æhhþ>ÆT<Y@²
<Document MapÛ-D OJQJkHäÕwHSenthil SengodanPekka PessiSirpa Kuisma¯]6à:/;(<}<=.@â@#JJL%NkOP
QWïWêY5]ù]°hf7h
Oú³ŠÆÈvÔÕ±ÝöäwHsseØzbUv8PPeØzbUv8PPeØzbUv8PPeØzbUv8SKuØzbUv8sseØzbUv8sseØzbUv8SKuØzbUv8SKuØzbUv8SKuØzb Uv8SKuØzb
Uv8sseØzbUv8SKuØzbUv8SKuØzb
Uv8PPeØzbUv8sseØzbUv8sseØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8PPeØzbUv8SKuØzbUv8sseØzbUv8PPeØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8SKuØzbUv8sseØzbUv8SKuØzbUv8PPeØzb Uv8sseØzb!Uv8PPeØzb"Uv8PPeØzb#Uv8PPeØzb$Uv8PPeØzb%Uv8sseØzb&Uv8EñçG÷Iñ?ùOòë |
¿
ê
/s>ïæD
[(Uå!NLvy~Ôtì²ËÅwH$ÿÿÿÿA$ÿÿÿÿ$ÿÿÿÿ·$ÿÿÿÿæ$ÿÿÿÿ%ÿÿÿÿ%JÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉÉüw¯Iïb 0"0@äEXN5bf
ã€v±]Õ€ìeùýÀS/[1ç2458Y9H;Ú<1@ÿAÒCE FcHþJ4LwMš®±³Žµ¶žŸÀÂÇËÏÒÕãçíïõÿ
¢òüÅ ¹i!Š%u(v*T9LHN¹OMQhI¡y£æªí°]²Ë¹«ŒŸ¿;ÃÓÆÖÉÙçó$ô>÷Š÷ý F*Â@Ö %ó)Ù*€,ã-þ/CwM©«¬¯²·¹º»œÁÃÅÆÈÊÍÎÑÓÔÖØÚÜÞàâäæèêëìðñòôö÷øùûüýþÂ,ÛC¹O+s:~¢7³ýºŸºÁeÅɱÚ$ôý)wMª°Œ¿ÄÉÌÐ×ÙÛÝßáåéîóúÿÿUnknownfoobarSenthil SengodanPekka PessiSirpa KuismaJim TogaÕëõ-IK\xzµ·Èäæÿ+GI^z|¯Ñíï02Mik ³ÏÑæ-IK_{}¡œ¿ä*FIc°³Ôðó*-B^aoœÙÜðB^aŠ©¿ÛÞ
&)Hdg®±Úöù/2Ploqp#p:pw§wÏwd{}
~â÷ùw£££š£Á£Ã£ZÆoÆqÆ̧̥̩ÌÀÌÂÌSäjäläoääää¢ä€ä«äÂäÄäØçïçñçYðpðrðdôyô{ôõ#õ%õOõdõfõŠõœõ¿õø
wH
ÿ%ÿÄ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÀ%ÿÄ%ÿÄ%ÿÄ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÀ%ÿÄ%ÿÀÿÿÿ:ÿ:ÿ:ÿ:ÿ:ÿ:ÿ:ÿÿÿÿÿÿÿÿÿ:ÿ:ÿ:ÿÿ:ÿJQT]x°¿Ïêùü!ÿÿ!ÿÿÿ!ÿE^ñ
®çG`³÷Ibñ
?X³ùOhò ë
|
¿
Ø
ê
/Hs>Wï©æÿD]*
#[t(AUnåþ!:Ng4Ley!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!ÿÿddatedorlangdnumstarttoc
_Toc410402439
_Toc410402613
_Toc410402794
_Toc410402440
_Toc410402614
_Toc410402795
_Toc410402441
_Toc410402615
_Toc410402796
_Toc410402442
_Toc410402616
_Toc410402797
_Toc410402443
_Toc410402617
_Toc410402798
_Ref379881422
_Toc410402444
_Toc410402618
_Toc410402799
_Toc410402445
_Toc410402619
_Toc410402800
_Ref379881658
_Ref379881663
_Ref379881901
_Toc410402446
_Toc410402620
_Toc410402801
_Toc410402447
_Toc410402621
_Toc410402802
_Ref379881670
_Toc410402448
_Toc410402622
_Toc410402803
_Toc410402449
_Toc410402623
_Toc410402804
_Toc410402450
_Toc410402624
_Toc410402805
_Ref379881675
_Ref379882051
_Ref379882131
_Toc410402451
_Toc410402625
_Toc410402806
_Toc410402452
_Toc410402626
_Toc410402807
_Toc410402453
_Toc410402627
_Toc410402808
_Ref379881553
_Toc410402454
_Toc410402628
_Toc410402809
_Toc410402455
_Toc410402629
_Toc410402810
_Toc410402456
_Toc410402630
_Toc410402811
_Ref379883882
_Toc410402457
_Toc410402631
_Toc410402812
_Toc410402458
_Toc410402632
_Toc410402813
_Toc410402459
_Toc410402633
_Toc410402814
_Toc410402460
_Toc410402634
_Toc410402815
_Toc410402461
_Toc410402635
_Toc410402816
_Toc410402462
_Toc410402636
_Toc410402817
_Ref394290845
_Toc410402463
_Toc410402637
_Toc410402818
_Toc410402464
_Toc410402638
_Toc410402819
_Toc410402465
_Toc410402639
_Toc410402820
_Ref379884024
_Toc410402466
_Toc410402640
_Toc410402821
_Ref394290868
_Toc410402467
_Toc410402641
_Toc410402822
_Ref399040960
_Toc410402468
_Toc410402642
_Toc410402823
_Toc410402469
_Toc410402643
_Toc410402824
_Ref399040981
_Toc410402470
_Toc410402644
_Toc410402825
_Ref399041035
_Toc410402471
_Toc410402645
_Toc410402826
_Ref394290904
_Toc410402472
_Toc410402646
_Toc410402827
_Ref379881757
_Toc410402473
_Toc410402647
_Toc410402828
_Toc410402474
_Toc410402648
_Toc410402829
_Toc410402475
_Toc410402649
_Toc410402830endtoc
_Ref379881781
_Ref379883848
_Ref379882083
_Ref379882088
_Ref379882197
_Ref379882173nttttF+F+F+Q5Q5Q5ÕBÕBÕB»D»D»DôHôHôHôHIIIµLµLµLµLµLµL{W{W{WZZZZ€\€\€\ÓaÓaÓaôhôhôhôhôhôh+n+n+noooŽo¶o¶o¶oÝoÝoÝouuu'uwww
y
y
yo{o{o{IIIâââPPPiiiifff|||©©©©::::ŠŠŠkkkkQQQQ!¡#¡#¡#¡Ù£Ù£Ù£^^^êÅBÇÔ^â^â^âhõxH
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
¢fft|||]+]+]+_5_5_5ñBñBñBÉDÉDÉD
I
I
I
IIIIÇLÇLÇLÇLÇLÇLWWW=Z=Z=Z=ZÆ\Æ\Æ\ëaëaëaiiiiii;n;n;n®o®o®oÜoÜoÜoÜoîoîoîo&u&u&uAwAwAwAwªyªyªy{{{XXXhhh{{{{qqqšššººººjjjj¥¥¥¥¹¹¹ÈÈÈÈyyyyI¡I¡I¡I¡ð£ð£ð£yyyêÅ^Ç
ÔzâzâzâõxHÿÿ%
Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ Uv8ÿÿÿÿ
Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ
Uv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿUv8ÿÿÿÿ Uv8ÿÿÿÿ!Uv8ÿÿÿÿ"Uv8ÿÿÿÿ#Uv8ÿÿÿÿ$Uv8ÿÿÿÿ%Uv8ÿÿÿÿ&Uv8ÿÿÿÿ`5þ9 ;µ;m<O=r?C@J4L'MóNíOPWãWY.]ô]shøÞb€i
~âì²ÆÈiÔÕ*Ýéä`)
!"#$¯]6à:/;(<}<=.@â@#JJL%NkOP
QWïWêY5]ù]°hf7h
Oú³ŠÆÈvÔÕ±Ýöä`)SXÜä9C!+T^((///3;3*52575>5G5N5ñ5]6Í:Ø:+<7<:<F<="=9=B=Ü>ê>ä@å@æ@í@î@ò@ó@µABBzBB0D4DODUDWD]DbDiD,H>H I*IûJ
KK&KbKyK~KKgTqTRX\X«aµafbibÕbØbÈdÚd^hph³jÀjýno o®oárär¹zÁzÚzèz^{l{ö 24<ªïXj§«¿
À
Ò
w£Øê:Hÿ#?MÄÎN\Q_Sa€ÖàIR^h7@ùØÝ÷ü {fh€€É¥Ö¥§§ššršš²©Â©ß©ö©ª ª¬"¬f¬v¬ï°±ì±²²²P³_³³³Ë³Ô³ó³ü³Ž'Ž8ŽCŽeŽyŽŽŽTµYµlµsµµµ¡µšµ¶¶^¶u¶
¶¶¶§¶©¶²¶à¶ç¶ ··8·=·`·c·m·x·z··«·µ·ø·žžž7ž<ž?žDž[žjžžž¡ž±žœžÆžÞžéžìž¹¹¹š¹²¹µ¹¿¹Ä¹Ð¹é¹ï¹ò¹ø¹yººº§ºÁºÇºËºÑºòºÿº=»J»Y»c»x»»»€»š»®»ŒŒ€ŒªŒÛŒáŒGœZœdœtœvœœœ€œ©œ³œËœÔœÖœßœãœöœŸŸŸŸ"Ÿ0Ÿ<ŸPŸŸŸÁŸÔŸÜŸíŸ+¿3¿\¿o¿w¿¿Å¿Í¿ç¿ñ¿ó¿ý¿À#À+À8ÀFÀYÀGÁTÁUÁ`ÁcÁoÁ|ÁÁÁŠÁ°ÁÈÁÔÁåÁöÁÿÁÂ&Â'Â0ÂLÂSÂTÂ]¹ÂÃÂÈÂÑÂÝÂóÂøÂÃÃ*Ã,Ã=Ã@ÃOÃ_ÃhÃwÃÃÃÃìõÃÆÃÈÃ×ÃÄ Ä#Ä1Ä3Ä<Ä?ÄNÄOÄXÄyÄÄÄÄĶÄØÄæÄèÄñÄõÄÅÅÅ*Å:Å_ÅoÅyÅÅÅÅÆÆEÇOÇÇÇÎ*ÎoÎrÎtÏÏÐ,ÐmÒ|Ò»ÒÊÒÐÓßÓöÓÔ;ÔEÔÖ%ÖÍÜÑÜÌÞÖÞgáqáeâoâ`çnç¶è»èðèþèé)éééýéêê©êëë!ë*ëTëaëkëpëëë©ëœëúëììì\ìiìpììííîîîî î#îBîVîÚîÝîöîùî'ï;ï|ïïïïïïÌïÞïðð¡ó¯óa÷k÷÷ ÷®÷¶÷^h0~H T X f q È Ð ò
/
:
",'?Qhlu~ §±×à0:LU\nAN©ÀL[cou ÓëóÆÜàñ ËÐ
«°SYªŽ{#)ÑÛ9>ÁÆìöíó! ' y!~!##Ä#É#"$0$/%9%:%F%G%M%Ó%Ø%h&o&t&}&_'e'''ô'ý'R(Z(Ž(Œ(Ë(Ð(M)R)^)ö)þ*ÿ*²+º+¢2«26»6c:q:+;2;;;@;ž;Â;Ö;à;<<Ÿ<Ç<y==>>F>P>Ò>Û>á>ê>?$?k?|??€?¥?¯?Æ?Ñ?7@:@]@`@¯@»@Æ@É@ç@ð@ñ@ô@ü@AaAjAlAuAôA÷AÿAB5B8BTBWBBBC%CH*HxHÝßbqÛòŽ ž
÷
£§ŸÈ%a¬¯~ |""ú$%É%Ú%.(2( +°+,,É/:0Â5Î5ñ5^6_6e6ò67K7Y7€7ª799â:ã: ;/;;©;+<7<D=M===(>->Ü>ê>s?z?0@1@ä@ŽAµAŸA¡B§B¬CµC>DIDäFèFïIùI`KaKmMwM¿MÍM
TTZUlUUUWWXXóXY\\O\T\ì^ø^²_œ_Ç`Ò`<bNbœbÅbHcMc)dAdhh
isikjvj¯o³oppªqžqKr`rfsosõuýuz§z{I{h|y|}¡}~$~¶Ä <Øñ³¶Ìru€§÷06%mt¡¥ÉÒÇÑÕ×7<OQ15ÑØh µ §€¥Å¥Ö¥§§©©6¬9¬×éE±H±Ø±Û±R²U²0³6³`³b³³³ª³±³×³Ù³ï³ñ³ŽŽFŽHŽeŽ{ŽŽŽŽŽžŽÎŽÐŽµ!µTµ[µlµsµ¡µšµÇµËµÍµÖµ¶¶!¶%¶<¶G¶v¶x¶
¶¶©¶²¶à¶ç¶ ··8·=·`·c·m·x···¹·ø·žž ž7ž<žPžYžvž|žžžœžÆžÞžéž¹(¹¹¹š¹²¹Ä¹Ð¹é¹ï¹º"º3º@ºwººº§ºÁºÇºòºÿº»»W»c»x»»»€»Ï»Ó»ä»ñ»ŒŒ5Œ<Œ}ŒŒ€Œ¬Œ»Œ¿ŒÛŒáŒœœGœ\œœŠœãœøœ-Ÿ/Ÿ<ŸPŸŸŸŸ²ŸÜŸíŸ+¿3¿K¿P¿w¿¿Å¿Í¿ç¿ñ¿ÀÀ+À8À
ÁÁGÁTÁcÁoÁÁŠÁÔÁçÁöÁÿÁÂ&ÂLÂSÂÂÂÈÂÑÂøÂÃPÃRÃ_ÃhÃwÃÃïÃóÃõÃÄ
Ä#Ä1Ä?ÄNÄdÄmÄÄÄĶÄØÄæÄõÄÅÅ&Å_ÅqÅWÆXÆÆÆdÉnÉËËðËÿËÆÌÏÌ]ÐoÐ@ÑNÑÑ¡Ñ`ÔnÔ±ÕñÕøÖ|×:Ø;ØTÙYÙíÙîÙ,Ú5ÚGÜPÜbÝeÝyà{àà¥àŽàÃáŠä«ä÷äýäìåúåeæhæGéRéëëÊìÐìííïï9ñHñbóróßôçô>÷F÷ø&øøøpùsù.þ8þQÿRÿîÿ.<òÖàæìÜåc e q È Ð ð
-:z^(7ŽŸÂÃ¥Ž t Á ô!"m$u$$§$^)¿)Ã)ö)þ*ÿ*xHÿÿPekka Pessi*\\home\pessi\Docs\h235-white-commented.docPekka Pessi8C:\95\TEMP\AutoRecovery save of h235-white-commented.asd þÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ?nšvÑðÿÿÿÿÿÿÿÿÿPGKªVÿÿÿÿÿÿÿÿÿ.ZRÜÛÿÿÿÿÿÿÿÿÿ³lº"KªVÿÿÿÿÿÿÿÿÿÁ8&&vÑðÿÿÿÿÿÿÿÿÿå{c4KªVÿÿÿÿÿÿÿÿÿÅwMvÑðÿÿÿÿÿÿÿÿÿ·
~D¡ÿÿÿÿÿÿÿÿÿ*@hhþ.@hhþ.@h8þ56CJOJQJo() @h8þ.@hhþ.@h8þ.@hhþ.@h8þ) Á8&&PGå{c4þÿÿÿ .Z·
~³lº"ÅwM?nšÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ @hhþOJQJo(·ðÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ ÿ@ips2c\\NRCCSL01HE\ips2cPSCRIPTips2cips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBips2cžw 3dXXÀÈéM¶Ù!€Àë³pRÂdÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCustom page 1BBCustom page 2BBCustom page 3BBÂâÂâÂâÂâ( wH @ @GTimes New Roman5Symbol3&Arial3Times;"Helvetica;WingdingsM"
Univers (W1)ArialcCG Times (W1)Times New Roman?5 Courier New7Courier="AvantGardeCCG Times (WN)INewCenturySchlbk5"System5&Tahoma#A©ÐhºÍ!PÐ!&°f+2õ}ì¥ÀŽŽ20d-,ëÿÿITU-T H.235 RecommendationG. ThomPekka PessirdDocWord.Document.8ô9²q
1
0
Hi,
As I understand it, "RandomVal" and "ranInt" being restricted to 32 bits should not affect security if care is taken to change the key after a certain number of exchanges.
Random numbers are included to prevent replay attacks. If they were not included, then the GatekeeperId (or some known general ID) alone would be encrypted using the shared key, and an adversary could replay this encrypted GatekeeperId in the future without knowing the key. Including the random number prevents such a replay attack.
In most cases the random number generated by EPB is sent in plaintext to EPA. An adversary can maintain a table of random number and encrypted "random number + gatekeeperID". If the random number sent by EPB matches an entry with the adversary, he could launch a replay attack. Hence, it is important that the key should be changed at least before the random number sent by EPB repeats. Depending on the algorithm being used, it may be necessary to change the key prior to that in order to prevent other attacks, specifically known-plaintext attacks in this case.
So, it seems that 32 bits is sufficient. Moreover, 32 bits is a commonly chosen value for such purposes. For instance, the proposed authentication header extension for the IP header in TCP/IP has a 32 bit field for this purpose.
Regards,
Senthil
Senthil Sengodan
Nokia Research Center
----------
From: Mailing list for parties associ
To: ITU-SG16
Subject: Re: H.235wht2 (and related H.2250) - Remarks
Date: Friday, January 23, 1998 10:47AM
hello security guys,
you wrote:
1. The fields "RandomVal" and "ranInt" are defined as unconstrained
INTEGERs.
Is there a specific reason for that? It is more accurate to define a
range
for them: for example (0..4294967295) .
RandomVal and ranInt act as a challenge during the authentication
protocols. Restricting these fields
to 32 bits as proposed drastically reduces obtained security. Just to
note, that in this case with 32 bits, exhaustive search
on the challenge is easy by todays computers: thus replay attacks would
be possible.
That's why the randomVals and challenges are defined as arbitary
integers: to make such crypto attacks infeasible.
Therefore the spec should stay as it is.
you wrote:
4. ALGORITHM-IDENTIFIER is defined and never used.
As far as I remember this Algorithm-Identifier is obsolete and was
replaced by an ObjectIdentifier.
Martin Euchner.
-----------------------------------------------------------------------
| Dipl.-Inf. Phone: +49 89 636-46201
| Martin Euchner Fax : +49 89 636-48000
| Siemens AG
| ZT IK 3 mailto:Martin.Euchner@mchp.siemens.de
|
| Otto-Hahn-Ring 6
| 81730 Muenchen
| __________________
| Germany
-----------------------------------------------------------------------
-----Original Message-----
From: ITU-SG16 [SMTP:ITU-SG16@mailbag.jf.intel.com]
Sent: Donnerstag, 22. Januar 1998 17:57
To: ITU-SG16
Subject: H.235wht2 (and related H.2250) - Remarks
Hello, Jim!
I summarize below our remarks and questions regarding the ASN.1:
1. The fields "RandomVal" and "ranInt" are defined as unconstrained
INTEGERs.
Is there a specific reason for that? It is more accurate to define a
range
for them: for example (0..4294967295) .
2. In the definition below, what is the meaning for SEQUENCE containing
NULL
field? May be it is just a mistake: SEQUENCE instead of CHOICE?
-- signing algorithm used must select one of these types of parameters
-- needed by receiving end of signature.
Params ::= SEQUENCE {
null NULL, -- no value needed
ranInt INTEGER OPTIONAL, -- some integer value
iv8 IV8 OPTIONAL, -- 8 octet initialization vector
...
}
3. The NonStandardParameter is locally redefined. Its meaning is a
subset of
the structure of the same name from H.225.0. Could we use the H.225.0
definition, instead of redefining it once again?
4. ALGORITHM-IDENTIFIER is defined and never used.
5. What is the reason for using the definitions of type
"TYPE-IDENTIFIER.&Type" for single type only.
For example:
EncodedGeneralToken ::= TYPE-IDENTIFIER.&Type (ClearToken) -- general
usage
token
Means
EncodedGeneralToken ::= ClearToken -- general usage token
6. According to X.680, in the definitions of type "(WITH COMPONENTS
{...," ,
it should be stated for each field what constrain is applied to it:
PresenceConstraint ::= PRESENT | ABSENT | OPTIONAL | empty
"empty" is syntactically right, but doesn't add any meaning in our case.
For example:
The following statement
PwdCertToken ::= ClearToken (WITH COMPONENTS {..., timeStamp, generalID
})
doesn't provide any additional information to already defined:
ClearToken ::= SEQUENCE -- a `token' may contain multiple
value
types.
{
timeStamp TimeStamp OPTIONAL,
password Password OPTIONAL,
dhkey DHset OPTIONAL,
challenge ChallengeString OPTIONAL,
random RandomVal OPTIONAL,
certificate TypedCertificate OPTIONAL,
generalID Identifier OPTIONAL,
nonStandard NonStandardParameter OPTIONAL,
...
}
Shouldn't it have been explicitly stated as PRESENT?
7. The two above remarks (5 and 6) apply to H.225.0 as well. Look for:
FastStartToken ::= ClearToken (WITH COMPONENTS {..., timeStamp, dhkey,
generalID -- set to 'alias' -- })
EncodedFastStartToken ::= TYPE-IDENTIFIER.&Type (FastStartToken)
Thank you,
Orit Levin
RADVision Inc. E Mail: orit(a)radvision.com
575 Corporate Dr., Suite 420 Tel: 201-529-4300 ext. 230
Mahwah, NJ 07430 Fax: 201-529-3516
2
1
I have placed in the incoming directory at the gcl site a short paper
(TD) that contains a couple of additional clarifications to H.323 that I
thought were important.
Please note also that a much longer and somewhat modified H.225.0 changes
document has been placed there as well.
These docs will be applied to the previously issued white versions to
create the
final recommendation.
Dale Skran
Rapporteur, SG16 WP2 Q13
1
0