Application of ECC and SHA to Voice Encryption
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    VoIP has developed into a specialized voice communication technology currently, whose application is wider and wider. But the research shows that the security is the main content considered by the enterprise when VoIP is decided besides the service quality issue. In the real application, the reason that the enterprise doesn't want to deploy VoIP is that the security situation can't reach the application standard. This article studies the secure hash algorithm, discusses its implementation process and carries out the implementation of VC. Real-time voice encryption is completed by using the combination between elliptic curve cryptography and SHA, and the encryption between voice and data.

    Reference
    Related
    Cited by
Get Citation

孙立宏.椭圆曲线密码与SHA 算法在语音加密中的应用.计算机系统应用,2011,20(5):158-161

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 23,2010
  • Revised:October 10,2010
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063