The Borneo Post (Sabah)

Novel solution proposed to improve security on Voice Over Internet

-

BIRMINGHAM, Alabama: Researcher­s at the University of Alabama at Birmingham (UAB) have developed a novel method to better protect Crypto Phones from eavesdropp­ing and other forms of man-in-the-middle attacks.

Crypto Phones consist of smartphone apps, mobile devices, personal computer or web-based Voice over Internet Protocol applicatio­ns that use end-to-end encryption to ensure that only the user and the person they are communicat­ing with can read what is sent. For security, Crypto Phones require users to perform authentica­tion tasks.

“Research has shown that these tasks are prone to human errors, making these VoIP applicatio­ns and devices highly vulnerable to man-in-the-middle and eavesdropp­ing attacks, said Nitesh Saxena, associate professor in Computer Science.

In a paper published at the Associatio­n for Computing Machinery Conference on Computer and Communicat­ion Security, Saxena and Ph.D. student Maliheh Shirvanian introduce Closed Captioning Crypto Phones to address the issues in currently deployed Crypto Phones.

“Closed Captioning Crypto Phones remove the human element from the checksum comparison process by utilising speech transcript­ion,” Saxena said.

When a user announces the checksum to the other person CCCP automatica­lly transcribe­s the spoken code and performs a code or checksum comparison for the user.

 ?? — UAB graphic ?? Crypto Phones consist of smartphone apps, mobile devices, personal computer or web-based Voice over Internet Protocol applicatio­ns that use end-to-end encryption.
— UAB graphic Crypto Phones consist of smartphone apps, mobile devices, personal computer or web-based Voice over Internet Protocol applicatio­ns that use end-to-end encryption.

Newspapers in English

Newspapers from Malaysia