You are on page 1of 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/307546042

Implementation of an Encryption Scheme for Voice Calls

Article · May 2016

CITATIONS READS

10 2,720

3 authors:

Ali Takieldeen Hazem M El-Bakry


Delta University for Science and Technology Mansoura University
64 PUBLICATIONS 396 CITATIONS 390 PUBLICATIONS 5,081 CITATIONS

SEE PROFILE SEE PROFILE

Ahmed H. El Tengy
Mansoura University
9 PUBLICATIONS 45 CITATIONS

SEE PROFILE

All content following this page was uploaded by Ali Takieldeen on 01 September 2016.

The user has requested enhancement of the downloaded file.


International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016

Implementation of an Encryption Scheme for Voice Calls


Hazem M. El bakry Ali E. Taki_El_Deen Ahmed Hussein El tengy
Faculty of Computer Science IEEE Senior Member Alexandria Dept. of Communication
Mansoura University University Alexandria University
Helbakry5@yahoo.com A_takieldeen@yahoo.com Tengy_fox@yahoo.com

ABSTRACT Secured voice communication plays a very important


Voice calls are one of the popular ways of communication role in our day to day life. The need of securing our voice
between peoples. Making voice call is cheap, fast and simple. communication can be achieved by some steps [5] :-
Because of mobile networks attack or smartphones hackers, the  Using an intermediate server has a software
GSM networks are not secure, so that all Telephone encrypts calls from two parties, but it is much
conversations are vulnerable. This paper describes cost and need hardware and not available in
implementation of an encryption scheme for Voice Call that
each place you can go.
helps the user to encrypt the voice call before transmitting it
over the mobile network. The new idea of the system is  Using the code during the conversation by using
encrypting voice calls without using any secure servers or any code tables which change the word to another
intermediate systems between mobile phone and the GSM meaning, but this way is very old, hard to use,
network. The encryption process occurs before reaching to and not effective.
mobile phone. To maintain intensive security, the system uses  Using voice over Internet Protocol calls (VOIP)
an encryption algorithm based on AES encryption. Moreover, by using some websites provide a secured calls
it uses a private key is changed by user before make the call. or applications do the same job, but it needs an
Keywords internet connection to establish the calls and it
Cryptography, AES Encryption, Mobile System, Voice Call. maybe not fully secured.

1. INTRODUCTION
Mobile communication devices [1] have become commonplace 3. Voice Over Internet Protocol (VoIP)
during the past few years, integrating multiple wireless
networking technologies to support additional functionality and
services. Smartphones and personal digital assistants (PDAs)
give users mobile access to the internet, email, and many other
applications, but smartphone protection hasn’t maintained the
same theme as computer security [2]. Technical security
procedures, such as firewalls, antivirus, and encryption, are not
usual on mobile phones, and mobile phone operating systems
are not updated as often as those on personal computers.
Because of phone calls are subjected to hacking, espionage, and
eavesdropping, there should be a system that encrypt the phone
call before sending, so it can be more secure and safe [3].
Section 2 Need of Secured Voice Communication
Section 3 Voice Over Internet Protocol (VoIP)
Section 4 Encrypting Voice IP Calls
Section 4 Data Standard Encryption (DES) overview
Section 5 Implementation of an Encryption Scheme for Voice
Calls Fig(1) Diagram for making voice calls over internet
Section 6 Conclusion protocols (VOIP).

2. Need of Secured Voice Communication


The technique for making a phone call using the Internet is by
Any voice communication is vulnerable by two risks. using Voice over Internet Protocol (VoIP), because it uses
First one, when someone is listening to the conversation TCP/IP for sending and receiving voice information. The VOIP
beside us. The second one is, someone eavesdropping to converts analog voice signal into digitized data and compresses
it over the wire when it is getting transmitted. The first it. The digitized voice signal is divided or broken up into
risk can be avoided by being alerted during the packets. The packets are sent out across the internet by using
communication but the second risk is not in our control the internet’s TCP/IP protocol. The IP voice gateway delivers
because, we would never know who is listening or the packets, combines them, un-compresses them, and converts
eavesdropping to the conversation. [4] them back into original signal voice form. VoIP allows data and
voice communications run over a single network, which can
reduce the infrastructure costs. There VoIP feature is that the

1
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016

phone calls via the Internet free of charge as long as there is an


Internet connection. [6]
There are many applications use VOIP such as skype, 3CX,
Google Hangout, line, wechat, and Cool Dialer. 2. GSM Voice Call Security
VOIP uses many protocols, for example H.323, Media
Gateway Control Protocol (MGCP), Session Initiation Protocol
(SIP), H.248 (Megaco), Real-time Transport Protocol (RTP),
RTP Control Protocol (RTCP), Secure Real-time Transport
Protocol (SRTP), Session Description Protocol (SDP), Inter-
Asterisk eXchange (IAX), Jingle XMPP VoIP extensions, and
Skype protocol. [7]

5. Benefits of Business VoIP


The top benefits of business VoIP include [8]:
 Lower calling costs — 55% of current or potential VoIP
users said cost is the main reason they were using or
Fig(2) Diagram for GSM Voice Call Security.
considering the service, according to a 2010 survey
conducted by Better Buys for Business. Many business VoIP
plans charge companies a flat rate per phone and allow
GSM system that guarantees the confidentiality of user
unlimited local and long distance calling.
 Greater manageability — Putting a telephone system on the
data as well as traffic signals within the network. The
company’s computer network makes users’ phones easier to encrypting algorithms used in GSM have proved to be
manage. Adding or moving extensions requires a simple effective in ensuring traffic confidentiality. However, the
change in software configuration, rather than a complex re- only ensure the confidentiality of traffic over the wireless
wiring. channel. Voice traffic is transmitted across the networks
 Enhanced mobility — With business VoIP, employees can in the form of PCM or ADPCM speech which is possible
make and receive calls on their work lines while they’re out be unauthorized access to GSM-to-GSM or GSM-to-
of the office by using computer software that imitates their PSTN conversations. Furthermore, only the network
physical telephone. Many systems also have call routing operator controls the encryption on the GSM speech
features that automatically forwards calls to users’ cell or
channel and it is optional and not by the end user. Maybe
home phones, depending on where they are.
 Advanced features — Since they’re software-based, many
some users prefer to control the encryption of their
business VoIP systems come standard with powerful calling communications. To ensure the security of
features that can enhance users’ productivity. Some common communications should be encrypted speech signal
features include a display screen showing a name directory, before entering the communications system.
call records, and other information, multiple folders for GSM uses several encryption algorithms for security.
organizing voice mails, and integration with PCs that lets Such as A5/1, A5/2, and A5/3 ciphers, are used for
users call a number directly from a web browser or address transmitting the signal over the air. The strongest one of
book in an email client. these algorithms is A5/1 was developed and used in the
 Integration with other software — Business VoIP systems United States and Europe; the weakest one of these
can also enhance productivity by integrating with other
algorithms is A5/2 and used in other countries. a
software applications the business uses. For example,
software tools can allow businesses to keep better track of
ciphertext-only attack is possible to break A5/2 in real-
phone activity to increase the efficiency of their call centers. time, and also the rainbow table attack cracked A5/1 in
2007. [11]
4. Encrypting Voice IP Calls
VOIP converts analog voice signal into digitized data and
5. Implementation of an Encryption Scheme
compresses it. The digitized voice signal is divided or broken for Voice Calls
up into packets. The packets are sent out across the internet by
The main idea here is designing of an electronic circuit that
using the internet’s TCP/IP protocol, using the Internet is a
converts the voice received from the Microphone from analog
particularly insecure network. Anything send across internet
to digital, encrypts it, and converts it from digital to analog, and
can be easily interfered upon. This raises a concern, especially
then send it to the transmitter (phone) which transmit it to the
when the information is confidential, such as credit card
GSM network. On the other side, the receiver (phone) receives
numbers or corporate data, and is sent over the Internet.
the analog encrypted signal. This signal passes to circuit that
Another concern is to ensure the identity of the sender of the
converts it from analog to digital format, and then decrypt it.
data do is the owner of the card or not. [9]
The final step is to convert the form of decrypting digital signal
It has developed several ways to resolve these problems. to analog and produce audible sound by speakers again.
Including encryption, change in technology information from
one form to another form, even if it had received by someone
else will look strange have no meaning. When the recipient gets
information, the decryption converts the message back to the
original format. [10]

2
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016

A/D Encryption D/A


Process

D/A Decryption A/D


Process

Fig(7) Analog Audio signal after encryption

Fig(3) transmitting and receiving GSM calls after 5. CONCLUSION


encrypting and decrypting
In this paper, the need of encrypting important voice calls,
Because of mobile networks attack, the GSM networks are not
secure. Thus, the paper described a designed circuit that solved
this problem. The circuit converted the voice received from the
Microphone from analog to digital, encrypted it, and converted
it from digital to analog, and then sent it to the transmitter
(phone) which transmit it to the GSM network. On the other
side, the receiver (phone) received the analog encrypted signal.
This signal passed to circuit that converted it from analog to
digital format, and then decrypted it. The final step is to convert
the form of decrypting digital signal to analog, and produced
audible sound by speakers again. Thus, we were able to secure
telephone calls from eavesdropping and intruders.

6. REFERENCES
[1] Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.
"Analyzing Inter-Application Communication in
Android". In Proc. of the Annual International Conference
on Mobile Systems, Applications, and Services (2011).
Fig(4) Analog Audio signal before encryption [2] Marko Hassinen, "SafeSMS - End-to-End Encryption for
SMS Messages", IEEE International Conference on
Telecommunications, 2008, 359-365.
[3] S. Jahan, M. M. Hussain,M. R.Amin and S. H. Shah
Newaz, "A Proposal for Enhancing the Security System of
Short Message Service in GSM", IEEE International
Conference on Anti-counterfeiting Security and
Identification, 2008, 235-240.
[4] Nichols, Randall K. & Lekkas, Panos. "Speech
10100101010010 cryptology". Wireless Security: Models, Threats, and
Solutions. New York: McGraw-Hill 2002.
[5] C. K. LaDue, V. V. Sapozhnykov, and K. S. Fienberg. A
Fig(5) Digital Audio signal after encryption data modem for GSM voice channel. IEEE Transactions
on Vehicular Technology, 57(4):2205–2218, July 2008.
[6] Booth, Char, "Chapter 2: IP Phones, Software VoIP, and
Integrated and Mobile VoIP". Library Technology
01001011010101 Reports 46 (5): 11–19, 2010.
[7] Jht2, Echen, “What is VOIP”, “http://www.voip-
info.org/”, 2016.
Fig(6) Digital Audio signal after encryption [8] Sam Narisi, “Business VoIP: Features, Benefits and What
to Look For”, “http://www.itmanagerdaily.com”, 2015.
[9] Saruchi Kukkar, "Encrypted IP Voice Call
Communication on Android through Sip Server on 3G

3
International Journal of Computer Applications (0975 – 8887)
Volume *83*, April 2016

GPRS" International Journal of Engineering and


Technology Volume 2 No. 2, February, 2012.
[10] Ferguson, N., Schneier, B. and Kohno, "Cryptography
Engineering: Design Principles and Practical
Applications", T. Indianapolis: Wiley Publishing, Inc.
2010.
[11] N.N. Katugampala, “Real Time Data Transmission Over
Gsm Voice Channel for Secure Voice & Data
Applications”, Exploring the Technical Challenges in
Secure GSM and WLAN, 2004. The 2nd IEE (Ref. No.
2004/10660).

View publication stats

You might also like