本文已被:浏览 2303次 下载 3160次
Received:August 23, 2010 Revised:October 10, 2010
Received:August 23, 2010 Revised:October 10, 2010
中文摘要: VoIP 目前己经发展成为一种专门的语音通信技术,其应用范围越来越广。但是研究发现,除服务质量等问题外,安全问题是企业在做VoIP 决策时重点考虑的内容。在现实应用中,安全状况不能达到企业的应用标准是企业暂时不想部署VoIP 的原因。深入研究安全散列算法,论述了其实现的过程,并对其进行了VC 的实现。使用椭圆曲线密码与SHA 结合,加密语音数据,实现语音的实时加密。
Abstract:VoIP has developed into a specialized voice communication technology currently, whose application is wider and wider. But the research shows that the security is the main content considered by the enterprise when VoIP is decided besides the service quality issue. In the real application, the reason that the enterprise doesn't want to deploy VoIP is that the security situation can't reach the application standard. This article studies the secure hash algorithm, discusses its implementation process and carries out the implementation of VC. Real-time voice encryption is completed by using the combination between elliptic curve cryptography and SHA, and the encryption between voice and data.
keywords: ECC VoIP Hash function G.729
文章编号: 中图分类号: 文献标志码:
基金项目:
Author Name | Affiliation |
SUN Li-Hong | Department of Teaching, Fuxin College, FuXin 123000, China |
Author Name | Affiliation |
SUN Li-Hong | Department of Teaching, Fuxin College, FuXin 123000, China |
引用文本:
孙立宏.椭圆曲线密码与SHA 算法在语音加密中的应用.计算机系统应用,2011,20(5):158-161
SUN Li-Hong.Application of ECC and SHA to Voice Encryption.COMPUTER SYSTEMS APPLICATIONS,2011,20(5):158-161
孙立宏.椭圆曲线密码与SHA 算法在语音加密中的应用.计算机系统应用,2011,20(5):158-161
SUN Li-Hong.Application of ECC and SHA to Voice Encryption.COMPUTER SYSTEMS APPLICATIONS,2011,20(5):158-161