Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table

IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This tre...

Full description

Bibliographic Details
Main Author: Jaber, Aws Naser
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf
_version_ 1797010980481269760
author Jaber, Aws Naser
author_facet Jaber, Aws Naser
author_sort Jaber, Aws Naser
collection USM
description IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This trend will only continue. IP phones are adding color displays with full-blown Web browsers. Some are adding embedded Warning Do not forget to investigate how data is stored on a local system or any intermediary system. If, for instance, all log files of IM chat sessions are stored in clear, unencrypted text on a local computer where multiple people have access to the computer, the fact that the IM client encrypts sessions between the computers and the server does not fully protect those sessions. The session transcripts could still be read locally by anyone with access to the local computer. Today, while many companies might still choose to buy from a single vendor for the sake of convenience, the reality is that in the era of interoperable protocol standards like Session Initiation Protocol (SIP), the companies are no longer required to buy from the same vendor. The session initiation protocol (SIP) has recently become the main signaling protocol for Internet applications. The wide range of SIP services raises many concerns on SIP security. Thus, the most popular SIP authentication schemes were studied in this paper. The previous cryptographic scheme known as Yoon’s scheme proposes SIP authentication that brings efficiency in security but is costly in terms of time.
first_indexed 2024-03-06T15:27:35Z
format Thesis
id usm.eprints-43244
institution Universiti Sains Malaysia
language English
last_indexed 2024-03-06T15:27:35Z
publishDate 2013
record_format dspace
spelling usm.eprints-432442019-04-12T05:26:16Z http://eprints.usm.my/43244/ Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table Jaber, Aws Naser QA75.5-76.95 Electronic computers. Computer science IP phones have benefited greatly from the ever-increasing capabilities of computer hardware in general, including faster microprocessors, larger memory capacity, and greater network bandwidth. A single IP phone shipping in 2010 has far more computing capacity than most of the early PBXs. This trend will only continue. IP phones are adding color displays with full-blown Web browsers. Some are adding embedded Warning Do not forget to investigate how data is stored on a local system or any intermediary system. If, for instance, all log files of IM chat sessions are stored in clear, unencrypted text on a local computer where multiple people have access to the computer, the fact that the IM client encrypts sessions between the computers and the server does not fully protect those sessions. The session transcripts could still be read locally by anyone with access to the local computer. Today, while many companies might still choose to buy from a single vendor for the sake of convenience, the reality is that in the era of interoperable protocol standards like Session Initiation Protocol (SIP), the companies are no longer required to buy from the same vendor. The session initiation protocol (SIP) has recently become the main signaling protocol for Internet applications. The wide range of SIP services raises many concerns on SIP security. Thus, the most popular SIP authentication schemes were studied in this paper. The previous cryptographic scheme known as Yoon’s scheme proposes SIP authentication that brings efficiency in security but is costly in terms of time. 2013-05 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf Jaber, Aws Naser (2013) Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table. Masters thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Jaber, Aws Naser
Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_full Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_fullStr Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_full_unstemmed Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_short Improving The Efficiency Of Sip Authentication Based On The Pre-Calculated Look-Up Table
title_sort improving the efficiency of sip authentication based on the pre calculated look up table
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/43244/1/Aws%20Naser%20Jaber24.pdf
work_keys_str_mv AT jaberawsnaser improvingtheefficiencyofsipauthenticationbasedontheprecalculatedlookuptable