Abstract
We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the protocols for Voice over the Internet (VoIP), provides a high level of inherent security, and extends naturally to multilateral non-repudiation, e.g., for conferences. Signatures over conversations can become true declarations of will in analogy to electronically signed, digital documents. This enables binding verbal contracts, in principle between unacquainted speakers, and in particular without witnesses. A reference implementation of a secure VoIP archive is exists.
Please use the following format when citing this chapter: Kuntze. N., Schmidt, A.U., and Hett, C, 2007, in IFIP Internationa] Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, eds. Venter, [I., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R., (Boston: Springer), pp. 361–372.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kavanagh, J.: Voice over IP special report: From dial to click. http://www.computerweekly.com/Articles/2006/02/14/214129/VoiceoverIPspecialreportFromdialtoclick.html, visited 1.3.2006.
Baugher, M., et al: The Secure Real-time Transport Protocol (SRTP). RFC 3711, IETF, March 2004. http://www.ietf.org/rfc/rfc3711.txt
Edison, T.A.: Recording-telephone. United States Patent P.No.:l,012,250, United States Patent Office, Washington, DC (1911) Patented Dec. 19, 1911.
Mcrklc, R.C.: A certified digital signature. In Brassard, G., ed.: Advances in Cryptology (CRYPTO’ 89). Number 435 in LNCS, Springer-Verlag (1989) 218–238 Republication of the 1979 original.
Strasser, M.: Möglichkeiten zur Gestaltung verbindlicher Tclckoopcration. Master’s thesis, Universität Freiburg, Institut für Informatik und Gesellschaft (2001)
Kabatnik, M., Keck, D.O., M. Kreutzer, A.Z.: Multilateral security in intelligent networks. In: Proceedings of the IEEE Intelligent Network Workshop. (2000) 59–65
Poh, N., Bengio, S.: Noise-Robust Multi-Stream Fusion for Text-Independent Speaker Authentication. In: Proceedings of The Speaker and Language Recognition Workshop (Odyssey). (2004)
Rodriguez-Linares, L., Garcia-Mateo, C: Application of fusion techniques to speaker authentication over IP networks. IEEE Proceedings-Vision Image and Signal Processing 150 (2003) 377–382
Hollicn, H.: Forensic Voice Identification. Academic Press, London (2001)
Goodwin, C: Conversational organization: Interaction between speakers and hearers. Academic Press, New York (1981)
Landrock, P., Pedersen, T.: WYSIWYS? What You Sec Is What You Sign? Information Security Technical Report, 3 (1998) 55–61
ISO: Information Technology: Security Frameworks for Open Systems: Non-Repudiation Framework. Technical Report ISO10181-4, ISO (1997)
ISO: Information Technology: Security Techniques — Non Repudiation — Part 1: General. Technical Report ISO13888-1, ISO (1997)
Searle, J.R.: Mind, Language and Society. Basic Books, New York (1999)
Austin, J.L.: How to Do Things with Words. Harvard University Press, Cambridge, Mass. (1962)
Schmidt, A.U.: Signiertes XML und das Präscntationsproblcm. Datenschutz und Datensicherheit 24 (2000) 153–158
Schmidt, A.U., Loebl, Z.: Legal security for transformations of signed documents: Fundamental concepts. In Chadwick, D., Zhao, G., eds.: EuroPKI 2005. Volume 3545 of Lecture Notes in Computer Science., Springer-Verlag (2005) 255–270
Piechalski, J., Schmidt, A.U.: Authorised translations of electronic documents. In Venter, H.S., Eloff, J.H.P., Labuschagne, L., Eloff, M.M., eds.: Proceedings of the ISSA 2006 From Insight to Foresight Conference, Information Security South Africa (ISSA) (2006)
Rannenbcrg, K., Pfitzmann, A., Müller, G.: IT Security and Multilateral Security. In Müller, G., Rannenberg, K., eds.: Multilateral Security in Communications. Volume 3 of Technology, Infrastructure, Economy., Addison-Wesley (1999) 21–29
Rosenberg, J., et al.: SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002. http://www.ietf.org/rfc/rfc3261.txt
Schulzrinne, H., et al.: RTP: A Transport Protocol for Real-Time Applications. RFC 1889, IETF, January 1996. http://www.ietf.org/rfc/rfcl889.txt
Adams, C, et al.: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161, IETF, August 2001. http://www.ietf.org/rfc/rfc3161.txt
Choi, E.C., Huh, J.D., Kim, K.S., Cho, M.H.: Frame-size adaptive MAC protocol in high-rate wireless personal area networks. ETRI Journal 28 (2006) 660–663
Shreedhar, M., Varghese, G.: Efficient fair queuing using deficit round-robin. IEEE/ACM Transactions on Networking 4 (1996) 375–385
Hctt, Ch., Kuntze, N., Schmidt, A. U.: Security and non repudiation of Voiceover-IP conversations. To appear in: Proceedings of the Wireless World Research Forum (WWRF17), Heidelberg, Germany, 15–17 November 2006.
Perrig, A., Tygar, J.D., Song, D., Canetti, R.: Efficient authentication and signing of multicast streams over lossy channels. In: SP’ 00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2000) 56–75
Hett, C, Kuntze, N., Schmidt, A.U.: A secure archive for Voice-ovcr-IP conversations. In et al., D.S., ed.: To appear in the Proceedings of the 3rd Annual VoIP Security Workshop (VSW06), ACM (2006) http://www.arxiv.org/abs/cs.CR/0606032
Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN) http://www.tispan.org, sec also the Whitepaper http://www.newport-networks.com/cust-docs/91-IPSec-and-VoIP.pdf
Zühlke, M., König, H.: A signaling protocol for small closed dynamic multi-peer groups. In: Proceedings of High Speed Networks and Multimedia Communications, 7th IEEE International Conference (HSNMC 2004), Toulouse, France. Volume 3079 of LNCS., Springer-Verlag (2004) 973–984
Perkins, C, Hodson, O., Hardman, V.: A survey of packet loss recovery techniques for streaming audio. IEEE Network 12 (1998) 40–48
Zhu, Q.F., Kerofsky, L.: Joint source coding, transport processing, and error concealment for H.323-bascd packet video. In Aizawa, K., Stevenson, R.L., Zhang, Y.Q., eds.: Visual Communications and Image Processing’ 99. Volume i3653 of Proceedings of SPIE., SPIE (1998) 52–62
Kollctzki, S.: Secure internet banking with privacy enhanced mail — a protocol for reliable exchange of secured order forms. Computer Networks and ISDN Systems 28 (1996) 1891–1899
Grimm, R., Ochsenschläger, P.: Binding Cooperation. A Formal Model for Electronic Commerce. Computer Networks 37 (2001) 171–193
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Kuntze, N., Schmidt, A.U., Hett, C. (2007). Non-Repudiation in Internet Telephony. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds) New Approaches for Security, Privacy and Trust in Complex Environments. SEC 2007. IFIP International Federation for Information Processing, vol 232. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-72367-9_31
Download citation
DOI: https://doi.org/10.1007/978-0-387-72367-9_31
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-72366-2
Online ISBN: 978-0-387-72367-9
eBook Packages: Computer ScienceComputer Science (R0)