Font Size: a A A

Elliptic Curve Cryptography, And Sha-1 Algorithm In The Voip Voice Encryption Applications

Posted on:2009-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:S D WangFull Text:PDF
GTID:2208360248952500Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
IP-based network for voice transmission (VoIP) technology has now developed into a specialized voice communication technology, an ever-increasing scope of its application. One advantage is that the VOIP users without Internet access services in addition to the need to pay other costs, such as E-mail users no longer have to pay other costs as. VoIP in the enterprise and consumer areas increasing in popularity.But the researchers found that, in addition to quality of service issues, security issues is to do business in the VoIP decision-making focus on the content. In reality, many customers said, the security situation can not achieve enterprise applications standards is that they do not want temporary deployment of VoIP reasons. At present, the VoIP security issues facing the main four: Denial of Service (DOS) attacks, illegal access tariff, fraud or threats such as eavesdropping.VoIP voice transmission services and security mechanisms with the traditional telephone service completely different. The IP protocol itself does not prevent the attack, so a non-encrypted voice and data transmission flow easily intercepted or interception. Despite the present situation, the data packet interception in the VoIP security incidents is not the proportion of high, but because of this way of technical difficulty interception not, therefore, VoIP is becoming the mainstream voice services, voice and data packet detection listen to the VoIP may become a major security threat. VoIP security alliance under investigation at present some grasp of how hackers to attack specific targets and specific voice traffic within the network technology that enables VoIP security threats facing further intensify. Analog phone exist and the issue of wire-tapping, when companies use a digital phone users, as manufacturers are private agreements, it is difficult through simple means to interception. But VoIP environment, the problem has been put forward. A typical VoIP calls need signaling and media stream to establish two steps, RTP / RTCP in packet-based networks, such as voice transmission of information agreement. The agreement itself is open, even a small portion of the streaming media playback can be out without the need for the information before association. If someone in the data network through the Sniffer record all the information and software to replay will be voice communication from the staff of the crisis of confidence.In this paper, the major work done, the technical difficulties and innovation are as follows:1. DerectX substantial access to the relevant technology, research DerectSound architecture and development model, the biggest optimization system stability, security, scalability, and so on.1) how enumerated hardware information2) how to use double buffering technology acquisition, audio2. Study Wave format player. In the Windows Driver Model (WDM), DirectSound hardware buffer to the broadcast of any uncompressed or compressed sound formats, and these formats can be a WAVEFORMATEX or WAVEFORMATEXTENSIBLE structure described by the hardware support. Software buffer zone and non-WDM hardware buffer only supports 8 and 16-bit uncompressed format.3. Based on public-key cryptosystem based on the problems generally fall into three categories: large integer decomposition of the problem, discrete logarithm problem category, Elliptic Curve category. Sometimes the category classified as elliptic curve discrete logarithm category. This paper introduces the Elliptic Curve Cryptosystem related basic concepts, as well as some basic principles related to the definition and use of NTL large integer to be realized, and applied to the VoIP voice calls, calls guarantee security.1) introduced the Elliptic Curve Cryptosystem the basic concepts2) research and study on the elliptic curve defined Adder3) research in cryptography and learning curve of the oval, and how to achieve encryption and decryption algorithm4) the use of C language Elliptic Curve simple encryption / decryption, and how to make use of VoIP voice calls to the process. 4. In-depth study on the safety algorithm SHA-1 hash algorithm SHA (Secure Hash Algorithm, SHA) is the American National Standards and Technology, issued by the National Standards FEPS PUB 180-1, commonly known as SHA-1. Its length of more than 264 binary information generated 160 news summary output, the paper discusses in detail with charts realization of the process, and its Implementation of the C language.5. Introduced a voice compression standards, highlighting the G729a static repositories. VC and study in how to use their voice compression and decompression.6. That the use of Elliptic Curve Cryptosystem and SHA-1 combination of voice and data encryption using Elliptic Curve Cryptosystem and SHA-1 combination of voice and data encryption, real-time voice encryption7. On the relevant network transmission agreement1) TCP / IP protocol Introduction2) UDP transmission protocols, as well as how to control both sides of data synchronization.This paper mainly on PC achieve the above, through experiments, to a more satisfactory results...
Keywords/Search Tags:VoIP, DrectSound, Double buffering technology, Elliptic Curve Cryptosystem, SHA-1, G729a, TCP/IP, UDP, Encryption and decryption
PDF Full Text Request
Related items