Font Size: a A A

Phone Call Security Encryption Technology Research And Analysis

Posted on:2014-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:X P DongFull Text:PDF
GTID:2268330425961350Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the development of modern communication technology, mobile calls more and more common in people’s lives, and so at the same time the security of the phone calls are gaining people’s attention. In the design of the entire communication system, the call information has taken strict confidentiality mechanism for encryption and decryption, to ensure that the call will not be disclosed. In this paper, based on these problems based on the phone call security research and analysis.Based on the call information leakage may the entire communication system is divided into two parts for analysis:the first part is a phone call network side, in the second chapter, the second part is a phone call terminal, the content in the third chapter. The above two parts, focusing on information security and confidentiality mechanisms of communication system, and the possibility of call information disclosure mechanism and why research and analysis, and proposed encryption scheme.In the second chapter, the first GSM communication system analysis, system authentication process and call encryption mechanism, research and analysis, summed up information disclosure may arise both base stations and transmission of partial information was illegally intercepted the user identity theft the crack and certification process. Two breaches of confidentiality fundamental reason is that the system core encryption algorithm is cracked, the article on the communication system used in the encryption and decryption algorithms A5research and analysis.In the third chapter, the transport mechanism of the call information in the phone, and discuss the design principles of the call monitoring software for the Android platform and its implementation process, to find out the existence of security risks in the mobile terminal call the hiddenspyware by recording phone calls and sent to the listener through the mobile Internet functions. To address this issue, the article raised audio files encrypted Solutions.Finally, the paper details the design and implementation of the safety of mobile terminals, including system management, application permissions recording file automatically encrypted, application-Fi monitoring and important documents encryption and decryption.
Keywords/Search Tags:mobile call security, A5algorithm, Voice encryption, Secure mobile terminals
PDF Full Text Request
Related items