PROBABILITY ALGORITHMS AND METHODS OF IP-TELEPHONY SECURITY
DOI:
https://doi.org/10.31891/2219-9365-2021-67-1-19Keywords:
probabilistic algorithms, illegitimate correspondent, information interaction, Internet telephony, cryptographic protection, communication channelsAbstract
The urgent task of increasing the security of IP-telephony and security of software distribution of general classified information, which differs from the existing method of identifying an illegitimate subscriber, the introduction of automated software and hardware verification of the authentication line. When using in this case several communication channels, the corresponding check will give the chance to reveal the illegitimate subscriber. The results of the analysis and research provide an opportunity to indicate that the most well-known IP protocols for the distribution of general classified information need to be improved in two ways: improving the information security of IP - telephony and improving the basic indicators of IP protocols of Internet networks.
The Diffie-Hellman algorithm solves the following problems: provides an opportunity to identify an active illegitimate correspondent who uses voice synthesis software; to identify an active illegitimate IP correspondent - protocols in Internet telephony communication channels in the absence of previously distributed secret key information between correspondents, a trusted center. The method can be used in the evaluation of methods for monitoring the level of security of data packet-switched data in Internet telephony, which will provide the reliability of IP telephony and increase security.
One of the methods to increase the security of the IP protocol for the formation of general classified information is to monitor and prohibit an attack such as a "meeting in the middle" through the use of Internet IP telephony networks of several parallel independent communication channels. IP - a protocol with software verification of the authentication line of IP telephony does not provide an opportunity to determine which communication channel the illegitimate subscriber will perform active attacks. Also, the detection of an illegitimate subscriber in the communication channel is possible only after the successful completion of the protocol, the illegitimate subscriber can not be detected during the operation of the protocol.