Alternate encryption scheme for VoIP traffic

Loading...
Thumbnail Image
Authors
Pendse, Ravi
Thanthry, Nagaraja
Gopalakrishnan, Gopinath
Advisors
Issue Date
2009-10-05
Type
Conference paper
Keywords
Telecommunication traffic , Cryptography , Internet telephony , Computer crime , Cryptographic protocols , Public key cryptography
Research Projects
Organizational Units
Journal Issue
Citation
Thanthry, N.; Gopalakrishnan, G.; Pendse, R.; , "Alternate encryption scheme for VoIP traffic," Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on , vol., no., pp.178-183, 5-8 Oct. 2009 doi: 10.1109/CCST.2009.5335543
Abstract

Voice over IP is fast emerging as a strong contender to the traditional circuit-switched PSTN networks. Unlike the PSTN network, which requires dedicated lines, VoIP can share the network that is laid out to carry data traffic as well as other traffic categories. Securing VoIP and other real-time traffic is necessary considering the easy ways of hacking communication over internet. Most of the existing security solutions for VoIP such as IPSec, Secure Real Time Protocol (SRTP) and ZRTP use the standard symmetric encryption algorithms for encrypting voice traffic. In this paper, the authors propose an alternate encryption scheme that uses PKI architecture for the initial authentication and key exchange, and encrypts the real-time traffic with a symmetric algorithm using a unique key for each packet. The proposed algorithm expected to be less complex compared to the traditional encryption schemes in addition to enhancing the security of the communication. Initial analysis carried out by the authors indicates that the proposed scheme helps in improving the voice quality to a certain extent while maintaining the security of the communication

Table of Contents
Description
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xplore database licensed by University Libraries: http://libcat.wichita.edu/vwebv/holdingsInfo?bibId=1045954
Publisher
IEEE
Journal
Book Title
Series
Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on;vol., no., pp.178-183
PubMed ID
DOI
ISSN
EISSN