The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection
碩士 === 銘傳大學 === 資訊工程學系碩士班 === 95 === VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network. In this research, we will propose a secure VoIP s...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/uwqwqk |
id |
ndltd-TW-095MCU05392015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095MCU053920152018-04-10T17:11:48Z http://ndltd.ncl.edu.tw/handle/uwqwqk The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection 結合ECDH與動態金鑰變更機制以提升VoIP安全性之研究 Yu-Shuen Liu 劉宇舜 碩士 銘傳大學 資訊工程學系碩士班 95 VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network. In this research, we will propose a secure VoIP scheme to protect voice communication from eavesdropping. This secure VoIP scheme will be furnished by SIP(Session Initiation Protocol) and SDP(Session Description Protocol). We also take the advantage of ECDH (Elliptic Curve Diffie-Hellman) key agreement protocol to negotiate the secret key and use this secret key to encrypt/decrypt the voice packet by the well-known AES (Advanced Encryption Standard) encryption. Furthermore, we propose the Elliptic Curve-Dynamic Key Change Scheme to boost the security strength for VoIP by dynamically changing encryption keys. To sum up, the proposed secure scheme will protect the confidentiality of voice communications without affecting the quality of VoIP. Chia-Hui Wang Ming-Yang Su 王家輝 蘇民揚 2007 學位論文 ; thesis 79 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 銘傳大學 === 資訊工程學系碩士班 === 95 === VoIP(Voice over IP) technology makes use of voice encoding or compression techniques and packetize for transmitting on the internet. However, the voice packets are easy to eavesdrop from hackers on public network.
In this research, we will propose a secure VoIP scheme to protect voice communication from eavesdropping. This secure VoIP scheme will be furnished by SIP(Session Initiation Protocol) and SDP(Session Description Protocol). We also take the advantage of ECDH (Elliptic Curve Diffie-Hellman) key agreement protocol to negotiate the secret key and use this secret key to encrypt/decrypt the voice packet by the well-known AES (Advanced Encryption Standard) encryption. Furthermore, we propose the Elliptic Curve-Dynamic Key Change Scheme to boost the security strength for VoIP by dynamically changing encryption keys. To sum up, the proposed secure scheme will protect the confidentiality of voice communications without affecting the quality of VoIP.
|
author2 |
Chia-Hui Wang |
author_facet |
Chia-Hui Wang Yu-Shuen Liu 劉宇舜 |
author |
Yu-Shuen Liu 劉宇舜 |
spellingShingle |
Yu-Shuen Liu 劉宇舜 The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
author_sort |
Yu-Shuen Liu |
title |
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
title_short |
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
title_full |
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
title_fullStr |
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
title_full_unstemmed |
The Study of Coupling ECDH with Dynamic Key Change Scheme for VoIP Security Protection |
title_sort |
study of coupling ecdh with dynamic key change scheme for voip security protection |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/uwqwqk |
work_keys_str_mv |
AT yushuenliu thestudyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection AT liúyǔshùn thestudyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection AT yushuenliu jiéhéecdhyǔdòngtàijīnyàobiàngèngjīzhìyǐtíshēngvoipānquánxìngzhīyánjiū AT liúyǔshùn jiéhéecdhyǔdòngtàijīnyàobiàngèngjīzhìyǐtíshēngvoipānquánxìngzhīyánjiū AT yushuenliu studyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection AT liúyǔshùn studyofcouplingecdhwithdynamickeychangeschemeforvoipsecurityprotection |
_version_ |
1718624034881536000 |