Voice Over Internet Protocol Analysis

625 Words2 Pages

VoIP is used very extensively today because it is cheap and can used along with network services. The Organizations use same network to send VoIP and data traffic. Many VoIP applications provide good Quality of Service (QoS) but the security they provide are not sufficient for the practical purposes. They can be easily hacked by the crackers since VoIP are used over unsecure public network. Adding Encryption algorithm to the VoIP call is a good method to avoid being hacked during a call. In this paper we test the Quality of Service when various encryption techniques are added to the calls.

Encryption: Encryption is a process where the files is made unreadable by everyone except those who have the keys or the recipients. These encryption convert text into cipher text (encrypt) and vice versa (decrypt). There are two types of encryption keys asymmetric; where more than one key is used and symmetric keys where same key is used for encryption and decryption. In this study only symmetric keys algorithms are used they are: DES, Triple DES (3-DES), Blowfish-256, AES-128, AES-256 and RC2.
...

Open Document