CFP last date
20 December 2024
Reseach Article

Implementation of an Encryption Scheme for Voice Calls

by Hazem M. El Bakry, Ali E. Taki El Deen, Ahmed Hussein El Tengy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 2
Year of Publication: 2016
Authors: Hazem M. El Bakry, Ali E. Taki El Deen, Ahmed Hussein El Tengy
10.5120/ijca2016910116

Hazem M. El Bakry, Ali E. Taki El Deen, Ahmed Hussein El Tengy . Implementation of an Encryption Scheme for Voice Calls. International Journal of Computer Applications. 144, 2 ( Jun 2016), 24-27. DOI=10.5120/ijca2016910116

@article{ 10.5120/ijca2016910116,
author = { Hazem M. El Bakry, Ali E. Taki El Deen, Ahmed Hussein El Tengy },
title = { Implementation of an Encryption Scheme for Voice Calls },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 2 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 24-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number2/25153-2016910116/ },
doi = { 10.5120/ijca2016910116 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:34.727652+05:30
%A Hazem M. El Bakry
%A Ali E. Taki El Deen
%A Ahmed Hussein El Tengy
%T Implementation of an Encryption Scheme for Voice Calls
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 2
%P 24-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Voice calls is a popular way of communication between persons. Making voice call is cheap, fast and simple. Because of mobile networks attack or smartphones hackers, telephone conversations are vulnerable. This paper presents an encryption scheme for Voice Calls. It helps the user to encrypt the voice call before transmitting it on the mobile network. The idea of the proposed system is to encrypt voice calls without using any secure servers or any intermediate systems between mobile phone and the GSM network. The encryption process occurs before reaching to mobile phone. To maintain intensive security, an encryption algorithm based on RSA encryption is used. Moreover, it uses a public key known by all users and a private key which is a secret and restricted key to each user.

References
  1. Chin, E., Felt, A. P., Greenwood, K., and Wagner, D. "Analyzing Inter-Application Communication in Android". In Proc. of the Annual International Conference on Mobile Systems, Applications, and Services (2011).
  2. Marko Hassinen, "SafeSMS - End-to-End Encryption for SMS Messages", IEEE International Conference on Telecommunications, 2008, 359-365.
  3. S. Jahan, M. M. Hussain,M. R.Amin and S. H. Shah Newaz, "A Proposal for Enhancing the Security System of Short Message Service in GSM", IEEE International Conference on Anti-counterfeiting Security and Identification, 2008, 235-240.
  4. Nichols, Randall K. & Lekkas, Panos. "Speech cryptology". Wireless Security: Models, Threats, and Solutions. New York: McGraw-Hill 2002.
  5. C. K. LaDue, V. V. Sapozhnykov, and K. S. Fienberg. A data modem for GSM voice channel. IEEE Transactions on Vehicular Technology, 57(4):2205–2218, July 2008.
  6. Mehta, P.; Udani, S., “Voice over IP”, IEEE Potentials, Vol.: 20 Issue: 4, Oct.-Nov. 2001.
  7. Lydia Uys, “Voice over internet protocol (VoIP) as a communications tool in South African business”, African Journal of Business Management Vol.3 (3), pp. 089-094, March 2009.
  8. A.A. Ojugo, R.E. Yoro, A.O, Eboka., “Implementation Issues of VoIP to Enhance Rural Telephony in Nigeria”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 2 Feb 2013.
  9. Saruchi Kukkar, "Encrypted IP Voice Call Communication on Android through Sip Server on 3G GPRS" International Journal of Engineering and Technology Volume 2 No. 2, February, 2012.
  10. Ferguson, N., Schneier, B. and Kohno, "Cryptography Engineering: Design Principles and Practical Applications", T. Indianapolis: Wiley Publishing, Inc. 2010.
  11. N.N. Katugampala, “Real Time Data Transmission Over Gsm Voice Channel for Secure Voice & Data Applications”, Exploring the Technical Challenges in Secure GSM and WLAN, 2004. The 2nd IEE (Ref. No. 2004/10660).
  12. Arfan Shaikh, “Audio Steganography And Security Using Cryptography”, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 2, February 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography RSA Encryption Mobile System Voice Call.