The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection

碩士 === 銘傳大學 === 資訊工程學系碩士班 === 95 === VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network. In this research, we will propose a secure VoIP s...

Full description

Bibliographic Details
Main Authors: Yu-Shuen Liu, 劉宇舜
Other Authors: Chia-Hui Wang
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/uwqwqk
id ndltd-TW-095MCU05392015
record_format oai_dc
spelling ndltd-TW-095MCU053920152018-04-10T17:11:48Z http://ndltd.ncl.edu.tw/handle/uwqwqk The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection 結合ECDH與動態金鑰變更機制以提升VoIP安全性之研究 Yu-Shuen Liu 劉宇舜 碩士 銘傳大學 資訊工程學系碩士班 95 VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network. In this research, we will propose a secure VoIP scheme to protect voice communication from eavesdropping. This secure VoIP scheme will be furnished by SIP(Session Initiation Protocol) and SDP(Session Description Protocol). We also take the advantage of ECDH (Elliptic Curve Diffie-Hellman) key agreement protocol to negotiate the secret key and use this secret key to encrypt/decrypt the voice packet by the well-known AES (Advanced Encryption Standard) encryption. Furthermore, we propose the Elliptic Curve-Dynamic Key Change Scheme to boost the security strength for VoIP by dynamically changing encryption keys. To sum up, the proposed secure scheme will protect the confidentiality of voice communications without affecting the quality of VoIP. Chia-Hui Wang Ming-Yang Su 王家輝 蘇民揚 2007 學位論文 ; thesis 79 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 銘傳大學 === 資訊工程學系碩士班 === 95 === VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network. In this research, we will propose a secure VoIP scheme to protect voice communication from eavesdropping. This secure VoIP scheme will be furnished by SIP(Session Initiation Protocol) and SDP(Session Description Protocol). We also take the advantage of ECDH (Elliptic Curve Diffie-Hellman) key agreement protocol to negotiate the secret key and use this secret key to encrypt/decrypt the voice packet by the well-known AES (Advanced Encryption Standard) encryption. Furthermore, we propose the Elliptic Curve-Dynamic Key Change Scheme to boost the security strength for VoIP by dynamically changing encryption keys. To sum up, the proposed secure scheme will protect the confidentiality of voice communications without affecting the quality of VoIP.
author2 Chia-Hui Wang
author_facet Chia-Hui Wang
Yu-Shuen Liu
劉宇舜
author Yu-Shuen Liu
劉宇舜
spellingShingle Yu-Shuen Liu
劉宇舜
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
author_sort Yu-Shuen Liu
title The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
title_short The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
title_full The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
title_fullStr The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
title_full_unstemmed The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
title_sort study of coupling ecdh with dynamic key change scheme for voip security protection
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/uwqwqk
work_keys_str_mv AT yushuenliu thestudyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection
AT liúyǔshùn thestudyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection
AT yushuenliu jiéhéecdhyǔdòngtàijīnyàobiàngèngjīzhìyǐtíshēngvoipānquánxìngzhīyánjiū
AT liúyǔshùn jiéhéecdhyǔdòngtàijīnyàobiàngèngjīzhìyǐtíshēngvoipānquánxìngzhīyánjiū
AT yushuenliu studyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection
AT liúyǔshùn studyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection
_version_ 1718624034881536000