CFP last date
20 May 2024
Reseach Article

Encryptsy – An AES Encrypted System for voice/data over Internet using DigiKey and VPN

by Kazi Sanam, Kazi Neha, Mun Alifiya, Chachiya Shahanawaz
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 26
Year of Publication: 2020
Authors: Kazi Sanam, Kazi Neha, Mun Alifiya, Chachiya Shahanawaz
10.5120/ijca2020920265

Kazi Sanam, Kazi Neha, Mun Alifiya, Chachiya Shahanawaz . Encryptsy – An AES Encrypted System for voice/data over Internet using DigiKey and VPN. International Journal of Computer Applications. 176, 26 ( May 2020), 12-15. DOI=10.5120/ijca2020920265

@article{ 10.5120/ijca2020920265,
author = { Kazi Sanam, Kazi Neha, Mun Alifiya, Chachiya Shahanawaz },
title = { Encryptsy – An AES Encrypted System for voice/data over Internet using DigiKey and VPN },
journal = { International Journal of Computer Applications },
issue_date = { May 2020 },
volume = { 176 },
number = { 26 },
month = { May },
year = { 2020 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number26/31361-2020920265/ },
doi = { 10.5120/ijca2020920265 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:43:32.193273+05:30
%A Kazi Sanam
%A Kazi Neha
%A Mun Alifiya
%A Chachiya Shahanawaz
%T Encryptsy – An AES Encrypted System for voice/data over Internet using DigiKey and VPN
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 26
%P 12-15
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Safety is a major concern in public network data handling, correspondence, delivery of messages, and electronic transactions. Encryption is to ensure sensitive information is secure. The focused area of study at VoIP is related to Voice data privacy and quality of service. In these areas VoIP encryption and voice data confidentiality transforms into a difficult one. As VoIP sends the voice/data packet through the public internet, there is risk of voice data confidentiality. Furthermore, the exchange of cryptographic keys to encrypt the media stream is vulnerable to attacks such as MITM (Man in the Middle Attack). Hence, there is a need for stronger key management. For the same purpose, a physical key will be used for the encryption/decryption. This will avoid sharing of keys over the Internet and symmetric encryption will be done on voice/data packet and will be passed over VPN.

References
  1. Abdalbasit Mohammed Qadir Software Engineering Department,”A Review Paper on Cryptography ”
  2. Monika Agrawal Department Of Computer Science,”A Comparative Survey on Symmetric Key Encryption Techniques “,Monika Agrawal et al. / International Journal on Computer Science and Engineering (IJCSE)
  3. Ria Andriani Magister Teknik Informatika Universitas AMIKOM Yogyakarta Yogyakarta,”Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File ”,2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia
  4. Horia Vlad Balan International University Bremen,”An Experimental Evaluation of Voice Quality over the Datagram Congestion Control Protocol ”,IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2007 proceedings.
  5. Ehsan Faghihi Engineering Department IRIB University,”QoS Parameters Analysis in VoIP Network Using Adaptive Quality Improvement”,SPIS2015, 16-17 Dec. 2015, Amirkabir University of Technology, Tehran, IRAN
  6. microchip.com/wwwproducts/en/ATtiny85
  7. Sulafa Khaled Talha Faculty of Mathematical Sciences University of Khartoum Khartoum, Sudan,” Evaluating the Impact of AES Encryption Algorithm on Voice over Internet Protocol (VoIP) Systems”, 2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)
  8. Stefan Hofbauer Danube Data Center GmbH, Network Department, Floridsdorfer Hauptstrasse 1, 1210 Vienna, Austria,” CDRAS: An approach to dealing with Man-in-the-Middle attacks in the context of Voice over IP”, 2011 Sixth International Conference on Availability, Reliability and Security
Index Terms

Computer Science
Information Sciences

Keywords

Encryption QoS VoIP VPN MITM Physical Key.