Desktop application for crypto-protected voice communication

Keywords: crypto protected sessions, real-time communication, voice sessions, SIP protocol, ZRTP protocol, communications

Abstract


Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats. In light of this, the transmission of voice over applications that do not use any type of crypto-protection allows anyone to discern the content of communication. Since voice transmission requires as little delay as possible, various protocols are used to enable crypto protected real-time communication. This paper presents one solution in a desktop application variant.

Methods: The essence in voice exchange systems as well as in other systems where real-time communication is necessary is the establishment of a crypto-protected session which is a virtual secure channel for communication to which only the communicating parties have access.  Voice sessions in the application are established with the SIP (Session Initiation Protocol) protocol. The sessions are further protected using the ZRTP (Zimmerman Real-time Transport Protocol) protocol. FusionPBX was used  as the SIP server (registrar) for testing purpouses. The application is developed in C++ language using the Qt framework.

Results: The final version of the application demostrates that ZRTP and SIP protocols are well suited for establishing crypto protected voice communications with low delay.

Conclusion: This   solution  provides   cryptographic   functions    for    data secrecy and the management of cryptographic keys. Improving the solution with digital signatures and certificates will result in additional cryptographic functions: data integrity and personal identification. With this improvement, this solution will be able to withstand modern security threats with low delay.

References

Abdallah, H.A. & Meshoul, S. 2023. A Multilayered Audio Signal Encryption Approach for Secure Voice Communication. Electronics, 12(1), art.number:2. Available at: https://doi.org/10.3390/electronics12010002.

Boruchinkin, A.Yu. 2015. Secure voice communication system with hardware encryption of data on hands-free headset. In: SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russian Federation, pp.76-79, September 8-10. Available at: https://doi.org/10.1145/2799979.2800030.

Eltengy, A.H. 2021. Encryption Of Voice Calls Using CryptoBin Algorithm. In: 2021 International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt, pp.1-5, July 13-15. Available at: https://doi.org/10.1109/ITC-Egypt52936.2021.9513963.

Ivanović, S. 2023. Razvoj aplikacije za kriptozaštitu govora u IP okruženju. BS thesis. Belgrade, Serbia: University of Defence (in Serbian).

Kara, M., Merzeh, H.R.J., Aydın, M.A. & Balık, H.H. 2023. VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. Computer Communications, 198, pp.247-261. Available at: https://doi.org/10.1016/j.comcom.2022.11.019.

Krasnowski, P. & Lebrun, J. 2022. Exchanging Keys with Authentication nd Identity Protection for Secure Voice Communication without Side-channel. arXiv:2211.07186. Available at: https://doi.org/10.48550/arXiv.2211.07186.

Merit, K. & Ouamri, A. 2012. Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm. International Journal of Distributed and Parallel Systems (IJDPS), 3(4), pp.157-164, Available at: https://doi.org/10.5121/ijdps.2012.3416.

Mondal, S. & Sharma, R.K. 2019. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, pp.1-6, July 06-08. Available at: https://doi.org/10.1109/ICCCNT45670.2019.8944857.

Ntantogian, C., Veroni, E., Karopoulos, G. & Xenakis, C. 2019. A survey of voice and communication protection solutions against wiretapping. Computers & Electrical Engineering, 77, pp.163-178. Available at: https://doi.org/10.1016/j.compeleceng.2019.05.008.

Qi, D., Longmei, N. & Jinfu, X. 2018. A Speech Privacy Protection Method Based on Sound Masking and Speech Corpus. Procedia Computer Science, 131, pp.1269-1274. Available at: https://doi.org/10.1016/j.procs.2018.04.342.

Tot, I., Trikoš, M., Bajčetić, J., Lalović, K. & Bogićević, D. 2021. Software Platform for Learning about Brain Wave Acquisition and Analysis. Acta Polytechnica Hungarica, 18(3), pp.147-162. Available at: https://doi.org/10.12700/APH.18.3.2021.3.8.

Published
2024/03/05
Section
Original Scientific Papers