Font Size: a A A

Secure Network Voice Communications (cryvoip) System Design And Realization

Posted on:2003-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:T WangFull Text:PDF
GTID:2208360092498983Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The rapid development of the Internet and computer leads to some new technologies. These new technologies have given a great impact to the traditional technologies. Meanwhile they bring some new problems.VoIP is such a new technology that transmits voice over IP. Because of characteristics of low price, confident additional services and the integration of several kind of data, it has developed quickly during the past several years. Many organizations and companies are contributing to the development and applications of VoIP nowadays, and it comes into its adult age.A voice system should ensure high quality voice first. Meanwhile, the net bandwidth is very finite and precious resource. We have to keep the balance of these two factors. Research of VoIP include: voice compression, system delaying, voice activation and voice priority.VoIP has to face another problem: system securities. VoIP transmits voice over an open network, and the voice data includes a great deal of important information, so it needs much more securities than the traditional data communications.We developed a security voice system over IP(CryVoIP). In order to get high quality voice in spite of low-bandwidth, our system uses several kinds of voice compression algorithms, and it realizes the functions of Voice Activation and Jitter compensation. On the other hand, we use some methods to make voice communication safe. The methods includes: filling traffic, encrypting voice datagram with conventional encryption algorithms; encrypting session key with asymmetric encryption, multiple authentication.
Keywords/Search Tags:VoIP, Voice Activation, Jitter Compensation, Traffic Filling, Multiple Authentication, Conventional Encryption, PGP
PDF Full Text Request
Related items