Security evaluation of VoIP cryptographic algorithms | ||||
The International Conference on Electrical Engineering | ||||
Article 21, Volume 6, 6th International Conference on Electrical Engineering ICEENG 2008, May 2008, Page 1-12 PDF (170.38 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/iceeng.2008.34211 | ||||
View on SCiNiTO | ||||
Authors | ||||
Faiz Yousif Mohmmed1; Alaa Eldin Rohiem2; Ashraf Diaa Elbayoumy2 | ||||
1Sudanese Armed Forces. | ||||
2Egyptian Armed Forces. | ||||
Abstract | ||||
Abstract: The communications world is moving toward VoIP but does not have the security expertise it needs in-house to meet the real world stress it will encounter. Unfortunately adding security has a negative effect on the voice quality of service (QoS). Many researches study the effects of adding security to VoIP using different cryptographic algorithms by comparing end to end delay, jitter and packet loss. Subjective and objective test methods are used to measure QoS [3,10]. But in our paper a new point of view is included, the goal of the paper is to compare the powerful of the securing algorithm by measuring the randomness of its encrypted output. In addition we measure execution time (delay) to be another factor of comparison. A C++ simulation program was written to simulate secure VoIP system. This paper organized as follows: 1. Introduction Section present the VoIP motivation, challenges, and security issues, section 2. Explain VOIP model, section 3. Describe statistical test suite and test bed environment, section 4. Demonstrate the statistical results, and the last section Express the conclusion. | ||||
Keywords | ||||
VOIP; SVoIP; Cryptography; ASCII Converter; Randomness measurement; StsGui; authentication | ||||
Statistics Article View: 137 PDF Download: 267 |
||||