UUM Electronic Theses and Dissertation
UUM ETD | Universiti Utara Malaysian Electronic Theses and Dissertation
FAQs | Feedback | Search Tips | Sitemap

New Cryptographic Algorithms for Enhancing Security of Voice Data

Al-Hazaimeh, Obaida Mohammad Awad (2010) New Cryptographic Algorithms for Enhancing Security of Voice Data. PhD. thesis, Universiti Utara Malaysia.

[thumbnail of Obaida_Mohammad_Awad_Al-Hazaimeh.pdf] PDF
Obaida_Mohammad_Awad_Al-Hazaimeh.pdf
Restricted to Registered users only

Download (6MB) | Request a copy
[thumbnail of 1.Obaida_Mohammad_Awad_Al-Hazaimeh.pdf]
Preview
PDF
1.Obaida_Mohammad_Awad_Al-Hazaimeh.pdf

Download (1MB) | Preview

Abstract

A real-time application Voice over Internet Protocol (VoIP) is the technology that enables voice packets transmission over internet protocol (IP). Security is of concern whenever open networks are to be used. In general, the real-time applications suffer from packet latency and loss due to the nature of IP network. Cryptographic systems may be used to achieve VoIP security, but their impact on the Quality of Services (QoS) should be minimized. Most of the known encryption algorithms are computationally expensive resulting in a significant amount of time added to packet delay. VoIP is usually used by public users resulting in a key exchange problem and a trusted intermediate authority normally takes this responsibility. In this research, VoIP security was enhanced via a proposed cryptographic system. The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. In this research, a new keys is generated in a random fashion and then used to encrypt each new voice packet to strengthen the security level. Key exchange is carried out by inserting the key with the ciphered voice packet that depends on the table of the key positions at the sender and receiver sides, and the target receiver is the only one who is able to extract the key. The encryption process in this research is divided into three main stages: key generation, encryption process, and key insertion process. The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. Furthermore, the analysis has proved that the security level has a direct relationship to the key length and the voice packet size in that large packet size requires more processing time. Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.

Item Type: Thesis (PhD.)
Supervisor : Sheik Osman, Wan Rozaini
Item ID: 2740
Uncontrolled Keywords: Computer Network Security, Voice over Internet Protocol (VoIP)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5101-6720 Telecommunication
Divisions: College of Arts and Sciences (CAS)
Date Deposited: 26 Feb 2012 00:46
Last Modified: 24 Jul 2013 12:17
Department: College of Arts and Sciences
Name: Sheik Osman, Wan Rozaini
URI: https://etd.uum.edu.my/id/eprint/2740

Actions (login required)

View Item
View Item