O'Reilly logo

Voice over IP Security by Patrick Park

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Cryptography

This chapter covers the basic concept and practice of the following topics in cryptography:

The topic of “VoIP security” includes many aspects. One of the key aspects is the methodology of information hiding; that is, how to conceal the signals and media in real-time communications from unauthorized entities. Cryptography is the main solution for this aspect.

Note

The purpose of this chapter is to give a high-level understanding of each technique with comprehensible figures, rather than looking into the mathematical detail of cryptographic algorithms.

As an introduction, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required