Algorithmic Approach to Encrypted Modes of Transmission of Real Time Media in a VOIP Architecture

Authors

  • Toshima Singh Rajput  Department of Cyber Law and Information Security, Barkatullah University, Bhopal, Madhya Pradesh, India
  • Kamini Maheshwar  Asst. Professor, Department of Computer Science and Engineering, UIT , Barkatullah University, Bhopal, Madhya Pradesh, India
  • Dr. Taruna Jain  HOD, Department of Cyber Law and Information Security, Barkatullah University, Bhopal, Madhya Pradesh, India

Keywords:

AES, TOTP, AES Modes, Plivo API, Pycrypto, Video, Messages

Abstract

Transmission of voice , video and messages over a secured channel of communication has become the priority of the companies emphasising on individualised privacy and support for the customers. Due to an increasing amount of security issues in the VoIP Platform,more technological advances and methods are being exercised to control the security parameters. This research paper is a study of the different modes of encryption of Advanced Encryption standard and generation of Time based one time password. This paper integrates these methods in providing an algorithmic approach to the transmission of voice, video and messages in an encrypted mode in a Client server architectural environment. This research paper integrates the Pycrypto implementation of the AES mechanism. This method is then implemented in a Voice client server architectural environment to provide a secured implementation of three factor authentication mechanism. The process uses the services of a Voice cloud service provider and is a python implementation of the algorithmic approach.

References

  1. Anita Dashti, Hashem Alvandi Kheradmand, Mohammad Davarpanah Jazi, "Comparison Of Three Modes Of Cryptography Operation For Providing Security and Privacy Based on Important Factors", International Journal of Information Technology and Electrical Engineering,ITEE, 5 (3), pp. 7-12, jun 2016
  2. Dobre blazhevski, Adrijan bozhinovski, Biljana Stojchevska, Veno Pachovski, "Modes of Operation of The AES Algorithm ",The 10th Conference for Informatics and Information Technology (CIIT 2013) pp 212-216
  3. Mohan H.S and A. Raji Reddy, "Revised AES And its Modes Of Operation", International Journal of Information Technology and Knowledge Management, January-June 2012, Volume 5, No. 1, pp. 31-36
  4. K Marimuthu, D Ganesh Gopal, Harshita Mehta and Aditya Rajan, P Boominathan, "A Novel Way Of Integrating Voice Recognition and One Time Passwords To Prevent Password Phishing Attacks", International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.4, July 2014
  5. Mohsen Gerami, Satar Ghiasvand,"One-Time Passwords via SMS ", Bulletin de la Société Royale des Sciences de Liège, Vol. : 85, 2016, p. 106-113
  6. Getting Started with Plivo, https://www.plivo.com/docs/getting-started/
  7. PyQT4 Reference Guide, https:// pyqt.sourceforge.net

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Toshima Singh Rajput, Kamini Maheshwar, Dr. Taruna Jain, " Algorithmic Approach to Encrypted Modes of Transmission of Real Time Media in a VOIP Architecture , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1876-1880, January-February-2018.