Simulation Protocols Authentication Subscriber in Voice Privacy
Simulasi Protokol Autentikasi Pelanggan pada Voice Privacy
Abstract
Existing design of the telephone public network is susceptible to eavesdropping on its voice stream. Consequently, any wire taper can listen to supposedly private conversation. In order to prevent such eavesdropping, we propose a protocols and its implementation for end-to-end voice privacy authenticate as a service available for interested subscribers. Our protocols consist of customer enrollment system, customer authentication system and simulation voice privacy. Protocols that we made are adaptation from Sharif and Wijekesera journal with the title Providing Voice Privacy as a Service over the Public Telephone Network. The result of the process shows how the customer enrolls and how the system process the password, how the system authenticate customer simulate voice privacy.
Collections
- UT - Computer Science [2322]