aes

Paper: Testing Randomness in Ciphertext of Block-Ciphers Using DieHard Tests

ABSTRACT
One of the important aspects of the security of block ciphers is the randomness of the cipher text. One criterion used to evaluate the Advanced Encryption Standard (AES) candidate algorithms was their demonstrated suitability as random number generators.
In this paper, we introduced a new approach to interpret the results of tests of randomness. This approach relies on using DieHard battery of tests which was designed originally to test the randomness of Random Number Generators (RNGs). The proposed approach was used to test the randomness of five types of data; plaintext, 3DES-encrypted, AES-encrypted, Serpent-encrypted, and Blowfish-encrypted. The tests resulted in 47 p-values for each type of data. This paper suggests the classification of results of DieHard tests into three areas; Safe Area, Doubt Area, and Failure Area. The resulting p-values for each data type were distributed over these areas according to the suggested ranges. The data type having more p-values in the Safe Area indicate better randomness, while the existence of many p-values in the Failure Area indicates deviation from randomness. The results of the implemented tests showed that AES- and Blowfish-encrypted data provided equal results in term of number of p-values distributed over different areas. The AES and Blowfish results were slightly better than Serpent-encrypted data while 3DES encrypted data had more p-values in the Doubt Area.

Citation Information:

Mohammed M. Alani, Testing Randomness in Ciphertext of Block-Ciphers Using DieHard Tests, International Journal of Computer Science and Network Security (IJCSNS), Vol.10, No.4, April 2010, pp. 53-57.

Implementation of AES in Voice over Internet Protocol

ABSTRACT
The paper is aimed to provide an implementation and evaluation of Advanced Encryption Standard (AES) to a Voice over Internet Protocol (VoIP) system. The research in this paper also concentrates on evaluation of Quality of Service (QoS) parameters and the effect of implementing the AES to voice packets. Although, the security provided by encryption is of unique importance to voice signals, designs must take into concentration keeping the QoS parameters in acceptable values. The VoIP model used in this paper was H.323 model. And encryption was implemented between the End Point (EP) and GateKeeper (GK) and between GKs too. The two scenarios evaluated here were calls made between EPs lying on the same GK and on different GKs.
Three QoS parameters were evaluated in this paper; delay, jitter, and loss. These parameters are the most influential on the quality of the voice session.
The implementation carried out in this paper by using Asterisk software as the GK and JCPPhone as the EP. A software module was added to Asterisk and JCPPhone to implement AES.
This study has shown that the implementation of AES in the used call models has given good QoS parameters for long and short distance calls. This implies that the integration of AES in VoIP future applications is possible.

Keywords: AES, encryption, computer network, VoIP, IP-Telephony, H.323, and VoIP security.
 

Citation Information:

Siddeeq Y. Ameen, Fawzi Alnaima, Mohammed M. Alani, Implementation of AES in Voice over Internet Protocol, accepted for publishing in Gulf University Journal (ISSN:1985-9562).

Paper: Design of H.323 Secure IP-Telephony Framework

ABSTRACT
The paper is aimed to provide a secure IP-Telephony system based on H.323 set of protocols. H.323 is a standard that specifies the components and procedures that provide multimedia communication services—real-time audio, video, and data communications—over packet networks, including Internet protocol (IP)–based networks. H.323 is part of a family of ITU—T recommendations called H.32x that provides multimedia communication services over a variety of networks. From the security aspect, H.323 provides a scheme for authentication between the End Point (EP) and the GateKeeper (GK). However, the authentication between EPs lying on different GKs needs to be considered. Thus, the paper shows a proposed model and implementation with the evaluation of such authentication process. It also provides secrecy for certain users that require such a service. These have been provided by providing authentication for EPs laying on different GKs, as well as providing encryption for the voice data traveling between EPs laying on same GK or different GKs.

Keywords: Computer network, VoIP, IP-Telephony, H.323, and VoIP security.

Citation Information:

Siddeeq Y. Ameen, Fawzi Alnaima, and Mohammed M. Alani, Design of H.323 Secure IP-Telephony Framework, published in The 6th International Philadelphia Engineering Conference On Computational Aspects and Their Applications in Electrical Engineering, Philadelphia University, Amman, Jordan, September, 2006.