Stream or Block Cipher for Securing VoIP?
نویسندگان
چکیده
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over landline, circuit-switched networks, since loss is negligible in these networks but corruption is not. Likewise, it is also clear that block ciphers perform better than stream ciphers over landline, packet-switched networks, since corruption is negligible in these networks but loss is not [9]. However, the choice of cipher is not so clear for a heterogeneous internetwork containing a mix of packet and circuit-switched networks. Additionally, this issue becomes even more confounded when heterogeneous internetwork also consists of wireless links. Existing encryption systems will degrade performance in a heterogeneous internetwork because such internetworks have appreciable loss and corruption. Thus, the error properties would degrade the subjective quality of the packet telephony application. In this paper we present an experimental results of comparing block and stream ciphers when used to secure VoIP in terms of end-to-end delay and subjective quality of perceived voice. We proposed a new technique, which provides automatic synchronization of stream ciphers on a per packet basis, without the overhead of an initialization vector in packet headers or without maintaining any state of past-encrypted data. We show that this technique mitigates the trade-off between subjective quality and confidentiality.
منابع مشابه
Energy Efficient Encryption using Counter mode of operation in Wireless Sensor Network
Sensor networks are deployed for various monitoring applications. The reporting should be in secure manner so that the adversary can’t forge the data and can be prevented from any disclosure. In this paper we have identified those calculations which are not necessary to be performed on sensor node for securing the network, shifted to base stations to save the energy at nodes. Using pre-processi...
متن کاملSTES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
The problem of securing data present on USB memories and SD cards has not been adequately addressed in the cryptography literature. While the formal notion of a tweakable enciphering scheme (TES) is well accepted as the proper primitive for secure data storage, the real challenge is to design a low cost TES which can perform at the data rates of the targeted memory devices. In this work, we pro...
متن کاملComparative study between stream cipher and block cipher using RC4 and Hill Cipher
Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet...
متن کاملWG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...
متن کاملCounter Mode Development for Block Cipher Operations
There are two basic types of symmetric algorithms: block ciphers and stream ciphers. Block ciphers operate on blocks of plaintext and ciphertext—usually of 64 bits but sometimes longer. Stream ciphers operate on streams of plaintext and ciphertext one bit or byte (sometimes even one 32-bit word) at a time. With a block cipher, the same plaintext block will always encrypt to the same ciphertext ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 5 شماره
صفحات -
تاریخ انتشار 2007