2018
DOI: 10.1007/978-3-319-77712-2_48
|View full text |Cite
|
Sign up to set email alerts
|

Extending AES with DH Key-Exchange to Enhance VoIP Encryption in Mobile Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…When the strength coefficient of network attack is 0.2 (at this time, it is under strong attack), the data loss rate of the method in reference [8] is 0.9%, the data loss rate of the method in reference [9] is 1.6%, the data loss rate of the method in reference [10] is 1.8%, and the data loss rate of the proposed method is 0.05%. With the increase of strength coefficient to 1.5, the data loss rate of the method in reference [8] is 9.8%, the data loss rate of the method in reference [9] is 12%, the data loss rate of the method in reference [10] is 9.5%, and the data loss rate of the proposed method is less than 1%, only 0.33%, which shows that the proposed method has better anti-attack ability.This is because the method in this paper will generate random key. After grouping according to 56 bits, a new 3DES key is obtained, which makes the encryption process more complex.…”
Section: Comparison Of Data Loss Ratementioning
confidence: 99%
See 3 more Smart Citations
“…When the strength coefficient of network attack is 0.2 (at this time, it is under strong attack), the data loss rate of the method in reference [8] is 0.9%, the data loss rate of the method in reference [9] is 1.6%, the data loss rate of the method in reference [10] is 1.8%, and the data loss rate of the proposed method is 0.05%. With the increase of strength coefficient to 1.5, the data loss rate of the method in reference [8] is 9.8%, the data loss rate of the method in reference [9] is 12%, the data loss rate of the method in reference [10] is 9.5%, and the data loss rate of the proposed method is less than 1%, only 0.33%, which shows that the proposed method has better anti-attack ability.This is because the method in this paper will generate random key. After grouping according to 56 bits, a new 3DES key is obtained, which makes the encryption process more complex.…”
Section: Comparison Of Data Loss Ratementioning
confidence: 99%
“…15 that the data integrity is different after encryption by different methods. When the amount of data is 5GB, the data integrity of the method in reference [8] is 69%, the data integrity the method in reference [9] is 78%, the data integrity the method in reference [10] is 87%, and the data integrity of the proposed method is 96%, so that the data integrity of the proposed method is the largest. With the increase of data encryption, the data integrity of the method in reference [8] is 68%, the data integrity of the method in reference [9] is 72%, the data integrity of the method in reference [10] is 73%, and the data integrity of the proposed method is 93%, which shows that the proposed method has the best data integrity.This is because the method in this paper generates a random key in the encryption process, and groups it according to 56 bits as a 3DES key, and then encrypts the plaintext through the key to generate a ciphertext, so that the integrity of the data is high and the interference is small.…”
Section: Comparison Of Data Integritymentioning
confidence: 99%
See 2 more Smart Citations