Presentation 2009-05-21
An Encrypted VoIP Communication System with a Mobile Phone
Hitoshi MORI, Yutaka ONO, Takasuke TSUJI, Akihiro SHIMIZU,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In the VoIP (Voice over Internet Protocol) communication using a public network, there is danger from which the content of the telephone call is tapped by a malicious third party. Therefore, there is VoIP over SSL (VoIPs) that encrypts the content of the telephone call and communicates. However, VoIPs cannot keep hiding the content of the telephone call after the code key is tapped once, consequence of using the same code key in the VoIPs communication. Moreover, it is difficult to apply it to low processing terminal, because the calculation cost would rise when the code key is regularly renewed. In this study, the SAS-2 authentic method was applied to the renewal of the code key, and the proposal and mounting and the evaluation of the communication protocol that achieves a low-cost key exchange were done.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) VoIP / Encryption / One-Time Password / SAS-2 / Mobile phone
Paper # LOIS2009-4
Date of Issue

Conference Information
Committee LOIS
Conference Date 2009/5/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Life Intelligence and Office Information Systems (LOIS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) An Encrypted VoIP Communication System with a Mobile Phone
Sub Title (in English)
Keyword(1) VoIP
Keyword(2) Encryption
Keyword(3) One-Time Password
Keyword(4) SAS-2
Keyword(5) Mobile phone
1st Author's Name Hitoshi MORI
1st Author's Affiliation Kochi University of Technology()
2nd Author's Name Yutaka ONO
2nd Author's Affiliation Kochi University of Technology
3rd Author's Name Takasuke TSUJI
3rd Author's Affiliation Trinity Security Systems, Inc.
4th Author's Name Akihiro SHIMIZU
4th Author's Affiliation Kochi University of Technology
Date 2009-05-21
Paper # LOIS2009-4
Volume (vol) vol.109
Number (no) 39
Page pp.pp.-
#Pages 6
Date of Issue