Security evaluation of VoIP cryptographic algorithms
نویسندگان
چکیده
منابع مشابه
A Comparative Evaluation of Cryptographic Algorithms
Security of information has become an important issue in data communication. Encryption has come up as a solution, and plays a vital role in information security system. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of compu...
متن کاملRecommendations for Hardware Evaluation of Cryptographic Algorithms
At the SASC 2006 three papers on hardware implementation of the eSTREAM candidates were presented. The workshop provided an interesting platform where hardware designers were confronted with the developers of the algorithms. The presentations were followed by a lively discussion. As hardware designers, we must admit that we have learned a lot from these discussions. In this brief document we wa...
متن کاملSecurity of VoIP
Voice over IP (VoIP) is gaining more popularity in today's communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to ...
متن کاملTowards Quantitative Metrics for Evaluation of VoIP Security Systems
VoIP systems is the new voice communication technology and is playing a key role in various sectors (Government, business, education etc) for the development of a country. Unfortunately, industry and academic researchers find difficulties to evaluate existing systems with focus on security to countermeasure the various attacks for either implementation in a real operator or future enhancement. ...
متن کاملData Security Algorithms for Cloud Storage System using Cryptographic Method
Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data securi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Conference on Electrical Engineering
سال: 2008
ISSN: 2636-4441
DOI: 10.21608/iceeng.2008.34211