DocumentCode
160339
Title
Real time implementation of Elliptic Curve Cryptography over a open source VoIP server
Author
Subashri, T. ; Arjun, A. ; Ashok, S.
Author_Institution
Dept. of Electron. & Commun. Eng., Anna Univ., Chennai, India
fYear
2014
fDate
11-13 July 2014
Firstpage
1
Lastpage
6
Abstract
This paper presents the design and the implementation of Elliptic Curve Cryptography in an Asterisk VoIP server which serves as an exchange for placing voice calls over the internet. Voice over internet protocol refers to the transmission of speech encoded into data packets transmitted across networks. VoIP networks are prone to confidentiality threats due to the weak keys used by the AES algorithm for encryption of the VoIP packets. So, in order to strengthen the key for encryption/decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. The elliptic curve used in this paper is a modified NIST P-256 curve and key generation algorithm using split exponents for fast exponentiation has been implemented to speed up and increase the randomness of key generation. The implementation of split exponents also help in increasing the security of the keys generated. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult in this scheme. This Method is successfully carrying out voice calls on VoIP clients connected to the internet. This ECDH key exchanging mechanism for voice calls in real time is implemented on an Asterisk PBX (Private Branch eXchange), using AGI(Asterisk Gateway Interface) server.
Keywords
Internet telephony; computer network security; private telephone exchanges; public domain software; public key cryptography; voice communication; AES algorithm; AGI server; ECDH Algorithm; Elliptic curve Diffie-Hellman algorithm; Internet protocol; VoIP networks; agreement scheme; asterisk PBX; asterisk VoIP server; asterisk gateway interface server; decryption; discrete logarithmic problem; elliptic curve cryptography; encryption; key agreement scheme; key generation algorithm; modified NIST P-256 curve; open source VOIP server; private branch exchange; speech transmission; Elliptic curve cryptography; Elliptic curves; Encryption; Servers; Asterisk PBX; Dynamic ECDH; IAX; Key exchange; SIP; Softphone; Split Exponents; VoIP;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Conference_Location
Hefei
Print_ISBN
978-1-4799-2695-4
Type
conf
DOI
10.1109/ICCCNT.2014.6963029
Filename
6963029
Link To Document