Desktop application for crypto-protected voice communication
Abstract
Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats. In light of this, the transmission of voice over applications that do not use any type of crypto-protection allows anyone to discern the content of communication. Since voice transmission requires as little delay as possible, various protocols are used to enable crypto protected real-time communication. This paper presents one solution in a desktop application variant.
Methods: The essence in voice exchange systems as well as in other systems where real-time communication is necessary is the establishment of a crypto-protected session which is a virtual secure channel for communication to which only the communicating parties have access. Voice sessions in the application are established with the SIP (Session Initiation Protocol) protocol. The sessions are further protected using the ZRTP (Zimmerman Real-time Transport Protocol) protocol. FusionPBX was used as the SIP server (registrar) for testing purpouses. The application is developed in C++ language using the Qt framework.
Results: The final version of the application demostrates that ZRTP and SIP protocols are well suited for establishing crypto protected voice communications with low delay.
Conclusion: This solution provides cryptographic functions for data secrecy and the management of cryptographic keys. Improving the solution with digital signatures and certificates will result in additional cryptographic functions: data integrity and personal identification. With this improvement, this solution will be able to withstand modern security threats with low delay.
References
Abdallah, H.A. & Meshoul, S. 2023. A Multilayered Audio Signal Encryption Approach for Secure Voice Communication. Electronics, 12(1), art.number:2. Available at: https://doi.org/10.3390/electronics12010002.
Boruchinkin, A.Yu. 2015. Secure voice communication system with hardware encryption of data on hands-free headset. In: SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks, Sochi, Russian Federation, pp.76-79, September 8-10. Available at: https://doi.org/10.1145/2799979.2800030.
Eltengy, A.H. 2021. Encryption Of Voice Calls Using CryptoBin Algorithm. In: 2021 International Telecommunications Conference (ITC-Egypt), Alexandria, Egypt, pp.1-5, July 13-15. Available at: https://doi.org/10.1109/ITC-Egypt52936.2021.9513963.
Ivanović, S. 2023. Razvoj aplikacije za kriptozaštitu govora u IP okruženju. BS thesis. Belgrade, Serbia: University of Defence (in Serbian).
Kara, M., Merzeh, H.R.J., Aydın, M.A. & Balık, H.H. 2023. VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. Computer Communications, 198, pp.247-261. Available at: https://doi.org/10.1016/j.comcom.2022.11.019.
Krasnowski, P. & Lebrun, J. 2022. Exchanging Keys with Authentication nd Identity Protection for Secure Voice Communication without Side-channel. arXiv:2211.07186. Available at: https://doi.org/10.48550/arXiv.2211.07186.
Merit, K. & Ouamri, A. 2012. Securing Speech in GSM Networks using DES with Random Permutation and Inversion Algorithm. International Journal of Distributed and Parallel Systems (IJDPS), 3(4), pp.157-164, Available at: https://doi.org/10.5121/ijdps.2012.3416.
Mondal, S. & Sharma, R.K. 2019. Application of Advanced Encryption Standard on Real Time Secured Voice Communication using FPGA. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, pp.1-6, July 06-08. Available at: https://doi.org/10.1109/ICCCNT45670.2019.8944857.
Ntantogian, C., Veroni, E., Karopoulos, G. & Xenakis, C. 2019. A survey of voice and communication protection solutions against wiretapping. Computers & Electrical Engineering, 77, pp.163-178. Available at: https://doi.org/10.1016/j.compeleceng.2019.05.008.
Qi, D., Longmei, N. & Jinfu, X. 2018. A Speech Privacy Protection Method Based on Sound Masking and Speech Corpus. Procedia Computer Science, 131, pp.1269-1274. Available at: https://doi.org/10.1016/j.procs.2018.04.342.
Tot, I., Trikoš, M., Bajčetić, J., Lalović, K. & Bogićević, D. 2021. Software Platform for Learning about Brain Wave Acquisition and Analysis. Acta Polytechnica Hungarica, 18(3), pp.147-162. Available at: https://doi.org/10.12700/APH.18.3.2021.3.8.
Copyright (c) 2024 Stefan М. Ivanović, Marko R. Marković, Sava S. Stanišić, Kristina R. Živanović, Dimitrije S. Kolašinac
This work is licensed under a Creative Commons Attribution 4.0 International License.
Proposed Creative Commons Copyright Notices
Proposed Policy for Military Technical Courier (Journals That Offer Open Access)
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).