As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Timely behavior of modern information security and protection is the defining characteristic of real time systems when faced with deadlines by which control responses must be produced or catastrophic failures may occur. In this chapter we present an algorithm to obtain end-to-end security for real-time communication systems, particularly in IP telephony. This chapter presents an asymmetric streaming cipher to encrypt real-time data units produced by an analogue-to-digital device. The robustness of the introduced one-way trapdoor function is grounded on the complexity of inverting highly non-linear Boolean permutations designed over non-commutative and non-associative algebraic structures. Moreover, the efficiency of the proposed method is achieved by providing real-time computation, and by eliminating the preliminary latent generation of embedded components and session keys.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.