Abstract
This paper describes the design and implementation of a secure internet phone utilizing a smartcard-based public key infrastructure. First, available hardware and software based systems are discussed followed by a description of the architecture of our system. More detailed information on the public key infrastructure including the certification authority, the client and the public key server are to come in chapters thereafter. The article finishes with a concise description of the audio subsystem.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35413-2_36
Chapter PDF
Similar content being viewed by others
Key words
References
FAST Software Security GmbH Co. KG: ASECrypto Cryptographic Library for 32-bit Windows, Application Programmers Guide and API-Reference, Version 1.3, März 1998, Germering, 1998.
D. E. Denning: Description of Key Escrow Systems (http://www.cosc.georgetown.edu/—denning/crypto/Appendix.html).
H. Dobbertin, A. Bosselaers, B. Preneel: RIPEMD-160 — A strengthened version of RIPEMD, st Software Encryption — Cambridge Workshop, Md. 1039, Springer-Verlag, Berlin, S. 71–82, 1996.
Audio compression algorithm GSM-6.10 source code. (http://kbs.cs.tu-berlin.de/—jutta/toast.html)
Escrowed Encryption Standard, FIPS PUB 185, 1994.
A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1999.
C. Burwick et al.: MARS — a candidate cipher for AES, IBM Corporation, 1999.
Network Associates, Inc.: An Introduction to Cryptography, 1999.
Nautilus Secure Phone (http://www.lila.com/nautilus/).
R.L. Rivest, A. Shamir, L.A. Adleman: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, Nr. 2, S. 120–126, 1978.
B. Schneier: Applied Cryptography, John Wiley Sons, 1996.
Microsoft Corporation: Microsoft Platform SDK, Juli 2000 Edition, Redmond, 2000.
Speek Freely (http://www.founnilab.ch/netfone/windows/doc/pgp.html).
Spyrus Inc.: Fortezza Crypto Card — Technical Specification (http://www.spyrus.com/content/products/legacy/fortezza/).
https://infosec.navy.mil/PRODUCTS/SECUREVOICE/stu3.html
Dept. of Defense Security Institute: STU-III Handbook for Industry, 1997.
P. R. Zimmermann: PGPfone — Owner’s Manual, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Horster, P., Schaffer, M., Schartner, P., Sommer, D. (2001). Secure Internet Phone. In: Steinmetz, R., Dittman, J., Steinebach, M. (eds) Communications and Multimedia Security Issues of the New Century. IFIP — The International Federation for Information Processing, vol 64. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35413-2_26
Download citation
DOI: https://doi.org/10.1007/978-0-387-35413-2_26
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4811-6
Online ISBN: 978-0-387-35413-2
eBook Packages: Springer Book Archive