Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves

被引:0
作者
Sen, Nilanjan [1 ]
Dantu, Ram [2 ]
Thompson, Mark [2 ]
机构
[1] Western Illinois Univ, Sch Comp Sci, Macomb, IL 61455 USA
[2] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
来源
2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI) | 2020年
关键词
Elliptic Curve; ECC; RTP; SRTP; Real-time media encryption; Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing popularity of streaming audio/ video is enhancing the popularity of real-time media applications and services. People use real-time media applications for voice/ video calls as well. Real-time Transport Protocol is a well-known protocol solely used for real-time data transmission, which uses the Voice over IP technology. Nevertheless, like other Internet applications, the security aspect has become a significant issue for real-time media applications. To protect users' privacy, real-time data such as streaming video or audio/ video calls can be encrypted during the conversation. Some real-time applications use symmetric key encryption to protect the media data. However, this cannot ensure the security of real-time media. An asymmetric key encryption technique can be a better choice in this context. Among other asymmetric key encryption schemes, Elliptic Curve Cryptography (ECC) performs better due to its comparatively smaller key size and lesser computation time. We must choose the elliptic curves judiciously to encrypt the voice call, because audio encryption may increase end-to-end delay, which worsens the quality of the call. The appropriate elliptic curves can be chosen from a set of elliptic curves by analyzing their performance on real-time audio encryption. In this work, we have implemented an ECC based encryption technique in a softphone to encrypt real-time voice calls. We have used 15 elliptic curves to measure the performance of audio calls, and based on the result, have proposed some suitable elliptic curves for real-time audio encryption.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 34 条
  • [1] [Anonymous], CALCULATING VOICE BA
  • [2] [Anonymous], CISCO - Quality of Service for Voice over IP
  • [3] Baugher M., 2004, The Secure Real-time Transport Protocol (SRTP)
  • [4] Bigot David., Secure VoIP protocols: SIPS and SRTP
  • [5] Bommagani Gautam., 2013, International Journal of Advanced Research in Computer Science and Software Engineering, V3, P158
  • [6] Camarillo G., 3261SIP RFC
  • [7] Critelli Anthony., Hacking VoIP: Decrypting SDES Protected SRTP Phone Calls
  • [8] Issues and challenges in securing VoIP
    Dantu, Ram
    Fahmy, Sonia
    Schulzrinne, Henning
    Cangussu, Joao
    [J]. COMPUTERS & SECURITY, 2009, 28 (08) : 743 - 753
  • [9] Digital Signature Standard (DSS), FEDERAL INFORM PROCE, V1864
  • [10] Security analysis of Voice-over-IP protocols
    Gupta, Prateek
    Shmatikov, Vitaly
    [J]. 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings, 2007, : 49 - 63