首页> 美国政府科技报告 >Using Voice Over Internet Protocol to Create True End-to-End Security
【24h】

Using Voice Over Internet Protocol to Create True End-to-End Security

机译:使用基于Internet协议的语音创建真正的端到端安全性

获取原文

摘要

In 2010, there were approximately 260,000 classified messages released to the general public via the website Wikileaks. The classified information was gathered by a 'trusted' military member who had the right level of clearance to view the documents in question, but did not have a need-to- know. This easily illustrates the flaw in trusted enclaves and computing bases that secure the data lower than Layer 7 of the OSI Reference Model. Once a spy, hacker, or 'trusted' member is inside the enclave, they have access to any and all information they wish to see. The goal of this thesis is to convey the need for security solutions that are developed at layer 7 of the OSI Reference Model. VOIP/SIP clients that use TLS and SRTP in conjunction with PKI will show that there are already solutions that exist at Layer 7. Additionally, clients that take advantage of ZRTP will provide the best examples of protecting data instead of just an infrastructure. Because only small amounts of source code will see unprotected data, thorough analysis of this code is achievable mitigating security vulnerabilities within the code.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号