O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Cryptography solutions

Abstract

After the VPNs are considered, the next step is to make sure that the Voice over Internet Protocol (VoIP) is encrypted in the secure tunnel. Eavesdropping and manipulation of the voice is relatively easy if the voice can be captured in the clear. Replay attacks are also a possible risk unless the voice is encrypted. Although encryption involved a cipher code that will add overhead (and overhead equates to latency), one should not neglect this area. Encryption is used to ensure confidentiality, assure the integrity of the VoIP, provide that the person is authenticated and is who he/she says he/she is, and finally guarantee nonrepudiation of the VoIP. Vendors are now including certificates that can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required