Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls

Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a VoIP call have been investigated by using the E model. A series of experiments have been conducted using a representative sample of modern codecs currently employed for digitising voice, as well as three of the most commonly used iterative block ciphers for encryption (DES, 3DES, AES). It has been found that the Internet Protocol Security encryption of VoIP strongly relates to the payload sizes and choice of codecs and this relationship has different effects on the overall QoE as measured by the E model, in terms of the way that users perceive the quality of a VoIP call. The main result of this paper is that the default payload shipped with the codecs is not the optimal selection for an increased number of VoIP calls, when encryption is applied and a minimum level of QoE has to be maintained, per call.


    1. 1)
      • Beyond VoIP protocols understanding voice technology and networking techniques for IP telephony
    2. 2)
      • ITU-T recommendation G.711: ‘Pulse code modulation (PCM) of voice frequencies’, 1988
    3. 3)
      • ITU-T recommendation G.723.1: ‘Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s’, 2006
    4. 4)
      • Salami, R., C., L., Bessette, B., Adoul, J.: `Description of itu-t recommendation g.729 annex a: reduced complexity 8 kbit/s cs-acelp codec', Proc. 1997 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP’97)-Volume 2, ICASSP’97 IEEE Computer Society, 1997, Washington, DC, USA, 2, p. 775–778
    5. 5)
      • DES: ‘Data encryption standard’. In FIPS PUB 46, Federal Information Processing Standards Publication, 1977, pp. 46–52
    6. 6)
      • Triple des cipher block chaining with output feedback masking
    7. 7)
      • The design of rijndael: AES – the advanced encryption standard
    8. 8)
      • Krawczyk, H., Bellare, M., Canetti, R.: `HMAC: keyed-hashing for message authentication', RFC 2104 (Informational), 1997
    9. 9)
      • US Secure Hash Algorithm I (SHAl)
    10. 10)
      • Elbayoumy, A.D., Shepherd, S.J.: `QoS control using an end-point CPU capability detector in a secure VoIP system', Tenth IEEE Symp. on Computers and Communications, IEEE Computer Society, 2005, p. 792–797
    11. 11)
      • Stream or block cipher for securing voip?
    12. 12)
      • Practical cryptography
    13. 13)
      • Iacono, L.L., Ruland, C.: `Confidential multimedia communication in ip networks', Int. Conf. on Communication Systems, 2002, 1, p. 516–523
    14. 14)
      • Atkinson, R.: `Security architecture for the internet protocol', RFC 1825, Internet Engineering Task Force, 1995c
    15. 15)
      • Kent, S., Atkinson, R.: `Security architecture for the internet protocol', RFC 2401, Internet Engineering Task Force, 1998
    16. 16)
      • Klaue, J., Hess, A.: `On the impact of ipsec on interactive communications', Proc. 19th IEEE Int. Parallel and Distributed Processing Symp. (IPDPS’05) – Workshop 17 IEEE Computer Society, 2005, Washington, DC, USA, p. 291.1
    17. 17)
      • Atkinson, R.: `IP authentication header', RFC 1826, Internet Engineering Task Force, 1995a
    18. 18)
      • Atkinson, R.: `IP encapsulating security payload (ESP)', RFC 1827, Internet Engineering Task Force, 1995b
    19. 19)
      • He use of HMAC-SHA-1-96 within ESP and AH. RFC 2404 (Standards Track)
    20. 20)
      • Saito, M., Fujimoto, S.: `Requirements for IPsec negotiation in the sip framework', RFC-Draft 1825, Internet Engineering Task Force, 2006
    21. 21)
      • Voznak, M., Rezac, F., Halas, M.: `Speech quality evaluation in IPsec environment', Proc. 12th Int. Conf. on Networking, VLSI and Signal Processing, Stevens Point World Scientific and Engineering Academy and Society (WSEAS), 2010, Wisconsin, USA, p. 49–53
    22. 22)
      • Bilien, J., Eliasson, E., Orrblad, J., Olov Vatn, J.: `Secure VoIP: call establishment and media protection', Second Workshop on Securing Voice over IP, 2005
    23. 23)
      • Ashraf, M.T.D.J., Grout, V.: `An investigation into the effect of security on performance in a VoIP network', Proc. Fifth Collaborative Research Symp. on Security, ELearning, Internet and Networking, SEIN 2009, 2009, Darmstadt, Germany, p. 15–28
    24. 24)
      • Niedelmaver, Heiko, Klenk, Andreas, Carle, Georg: `The networking perspective of security performance – a measurement study', Measuring, Modelling and Evaluation of Computer and Communication Systems (MMB), 2006 13th GI/ITG Conference, 27–29 March 2006, p. 1–17
    25. 25)
      • Hall, T.A.: `Objective speech quality measures for internet telephony', Proc. SPIE Voice over IP VoIP Technology, 2001, p. 128–136
    26. 26)
    27. 27)
      • Bergstra, J.A., Middelburg, C.A.: `Itu-t recommendation g.107: the ', Technical report, 2003
    28. 28)
    29. 29)
      • Ding, L., Goubran, R.A.: `Speech quality prediction in VoIP using the extended ', Proc. Global Telecommunications Conf., 2003, GLOBECOM’03. IEEE, 2003, p. 3974–3978
    30. 30)
    31. 31)
      • Performance analysis of IPsec protocol: encryption and authentication

Related content

This is a required field
Please enter a valid email address