Security evaluation of VoIP cryptographic algorithms

Document Type : Original Article

Authors

1 Sudanese Armed Forces.

2 Egyptian Armed Forces.

Abstract

Abstract:
The communications world is moving toward VoIP but does not have the security
expertise it needs in-house to meet the real world stress it will encounter. Unfortunately
adding security has a negative effect on the voice quality of service (QoS). Many
researches study the effects of adding security to VoIP using different cryptographic
algorithms by comparing end to end delay, jitter and packet loss. Subjective and
objective test methods are used to measure QoS [3,10]. But in our paper a new point of
view is included, the goal of the paper is to compare the powerful of the securing
algorithm by measuring the randomness of its encrypted output. In addition we measure
execution time (delay) to be another factor of comparison. A C++ simulation program
was written to simulate secure VoIP system. This paper organized as follows: 1.
Introduction Section present the VoIP motivation, challenges, and security issues,
section 2. Explain VOIP model, section 3. Describe statistical test suite and test bed
environment, section 4. Demonstrate the statistical results, and the last section Express
the conclusion.

Keywords