This chapter covers the basic concept and practice of the following topics in cryptography:

•   Symmetric (Private) Key Cryptography

—   DES

—   3DES

—   AES

•   Asymmetric (Public) Key Cryptography

—   RSA

—   Digital Signature (DSA)

•    Hashing

—   MD5

—   SHA

—   Message Authentication Code (MAC)

•   Key Management

CHAPTER 4Cryptography

The topic of “VoIP security” includes many aspects. One of the key aspects is the methodology of information hiding; that is, how to conceal the signals and media in real-time communications from unauthorized entities. Cryptography is the main solution for this aspect.

NOTE       The purpose of this chapter is to give a high-level understanding of each technique with comprehensible figures, rather than looking ...

Get Voice over IP Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.