Abstract

The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES key is generated from Minutiae Points in fingerprint. By other way, we talk about biometric-cryptosystem, which is hybrid between one of the cryptosystems and biometric systems, such as fingerprint using for authentication as well as to generate cryptographic key to encrypt voice over IP by applying AES. In this paper, we define a new term which is Fingerprint Distribution Problem (FDP) based on Key Distribution Problem. Also, we suggest a solution for this problem by encrypted fingerprint before sending between users by using one of the public key cryptosystems which is RSA Algorithm.

Highlights

  • A day, the computer networks allow sending different types of data via communication channels which connected with each other, audio, voice, text and video are different examples of data

  • Voice over internet protocol (VoIP) is a generally term for a many transmission technologies to deliver voice over internet protocol (IP) using applications designed for this purpose [8], [11], VoIP should be known as IP Telephony Voice over IP protocols carry telephony signals as digital audio

  • Deliver voice over IP commonly used between massive numbers of users around of the world, but the problems are begin when attacker eavesdropping calls between users by attack communication channel, to avoid these problems many of researchers suggested solutions for this shortcoming by encrypt the voice before deliver via communication channels, one of these solutions is a system which encrypt the VoIP data packets using Advanced Encryption Standard (AES), Advance Encryption Standard (AES) key is extracted from minutiae points from fingerprint authentication

Read more

Summary

INTRODUCTION

The computer networks allow sending different types of data via communication channels which connected with each other, audio, voice, text and video are different examples of data. Almost types before sending via communication channel will converted to the bits encapsulated in the packets. There are some of shortcomings demonstrate when apply this technology, the main shortcoming is when send the fingerprint between users via unsecure communication channel because these fingerprint is not just for authentication but it will be used to generate key for AES algorithm [1], [2]. The rest of the paper is organized as follows: Section 2 provides a brief introduction to VoIP and its security vulnerabilities. As well as it provides a brief introduction to AES and RSA Algorithms a brief Cryptographic Key Generated from Biometrics.

VoIP Security Vulnerabilities
RSA and AES Algorithms
CRYPTOGRAPHIC KEY GENERATED FROM BIOMETRICS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call