Title :
Real time implementation of Elliptic Curve Cryptography over a open source VoIP server
Author :
Subashri, T. ; Arjun, A. ; Ashok, S.
Author_Institution :
Dept. of Electron. & Commun. Eng., Anna Univ., Chennai, India
Abstract :
This paper presents the design and the implementation of Elliptic Curve Cryptography in an Asterisk VoIP server which serves as an exchange for placing voice calls over the internet. Voice over internet protocol refers to the transmission of speech encoded into data packets transmitted across networks. VoIP networks are prone to confidentiality threats due to the weak keys used by the AES algorithm for encryption of the VoIP packets. So, in order to strengthen the key for encryption/decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. The elliptic curve used in this paper is a modified NIST P-256 curve and key generation algorithm using split exponents for fast exponentiation has been implemented to speed up and increase the randomness of key generation. The implementation of split exponents also help in increasing the security of the keys generated. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult in this scheme. This Method is successfully carrying out voice calls on VoIP clients connected to the internet. This ECDH key exchanging mechanism for voice calls in real time is implemented on an Asterisk PBX (Private Branch eXchange), using AGI(Asterisk Gateway Interface) server.
Keywords :
Internet telephony; computer network security; private telephone exchanges; public domain software; public key cryptography; voice communication; AES algorithm; AGI server; ECDH Algorithm; Elliptic curve Diffie-Hellman algorithm; Internet protocol; VoIP networks; agreement scheme; asterisk PBX; asterisk VoIP server; asterisk gateway interface server; decryption; discrete logarithmic problem; elliptic curve cryptography; encryption; key agreement scheme; key generation algorithm; modified NIST P-256 curve; open source VOIP server; private branch exchange; speech transmission; Elliptic curve cryptography; Elliptic curves; Encryption; Servers; Asterisk PBX; Dynamic ECDH; IAX; Key exchange; SIP; Softphone; Split Exponents; VoIP;
Conference_Titel :
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Conference_Location :
Hefei
Print_ISBN :
978-1-4799-2695-4
DOI :
10.1109/ICCCNT.2014.6963029