AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS
AND THEIR EFFECTS ON VOIP UNDER DIFFERENT
CODING SCHEMES
Gregory Epiphaniou, Carsten Maple, Paul Sant
Institute for Research in Applicable Computing, University of Bedfordshire, Park Street, Luton, U.K.
Matthew Reeve
Modern Networks, Hitchin, U.K.
Keywords: VoIP, DES, 3DES, AES, HMAC-SHA-1, NS-2.
Abstract:
IP telephony (IPTel) refers to the technology to transport real-time media over an IP network. This technology
is considered as the key to providing advanced communication for end users at an affordable price whilst also
assuring significant cost savings for the Internet Telephony Service Providers (ITSP). As with adoption of any
new technology, utilizing VoIP is not without its risks. Digitizing voice that can be routed through hostile
environments such as packet switched networks makes VoIP vulnerable to all of the risks of an IP network
including viruses, Denial of Service (DOS) attacks and conversation eavesdropping. This paper focuses on
the effects of iterative block ciphers on VoIP traffic in terms of average end-to-end delay and packet loss rates.
We have tested the majority of voice codecs as well as all the variable payload sizes they can support. Finally,
the simulations have been carried out by using the NS-2 network simulator.
1 INTRODUCTION
Applying security protocols to voice traffic may
introduce processing overheads to the actual head-
ers added to the VoIP frame. Security protocols
such as Encapsulation Security Payload (ESP) and
Authentication Header (AH) are found to increase
(disproportionally) the ratio between the actual voice
payload and the header sizes carried across the net-
work and dramatically reduce the effective bandwidth
used (Barbieri et al., 2002). In addition, the total time
required to add the appropriate cryptographic func-
tions to the payloads, introduces further delays during
transmission. Recent studies have directed towards
the proper selection of ciphers (block or stream) for
VoIP based on their characteristics (Elbayoumy and
Shepherd, 2007).
Authors suggested that in a homogeneous ar-
chitecture where packet-switched networks are
inter-connected, the choice of block cipher option
is the most appropriate due to negligible corruption
but sufficient loss rates in those architectures. The
tradeoff between the packet size used for encryption
and the actual throughput of the crypto-enginee has
also investigated (Elbayoumy and Shepherd, 2005).
The case of encrypted VoIP streams under vari-
able payload sizes currently supported by G.711 (64
kbps), G.726 (32 kbps),G.726 (24 kbps) G.723.1 (6.3
kbps), G.723.1 (5.3 kbps) and G.729 (8 kbps) have
been investigated by using the Pareto ON/OFF traffic
model. In voice traffic the packets are generated in
active ON state whereas in silent OFF state no pack-
ets are generated (Li, 2008), (Bohnert and Monteiro,
2005). The interval periods are taken by the actual
codecs’ specifications which can effectively produce
the required number of packets per second, without
changing the codec rate.
The IPSec scenario in transport mode has
been used, assuming that the endpoints (IP
phones/softphones) can support cryptographic
operations. This framework of open standards is
widely known for its network layer authentication,
data integrity, confidentiality and replay protection
(Benvenuto and Keromytis, 2003). IPSec uses
the Internet Key Exchange (IKE) process for key
exchange consisting of two phases, in which a mutual
authentication between the communication parties
17
Epiphaniou G., Maple C., Sant P. and Reeve M. (2010).
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER DIFFERENT CODING SCHEMES.
In Proceedings of the International Conference on Signal Processing and Multimedia Applications, pages 17-25
DOI: 10.5220/0002930000170025
Copyright
c
SciTePress
takes place based on a secret key and establish a new
session key to protect the rest of the transmission.
The second phase relies on the session key created
at phase one to establish a session two key for
protecting the data in the security association (Radia
and Kaufman, 2000).
This paper focuses on the effect of iterative block
ciphers to VoIP traffic under different coding schemes
structured as follows: In section 2 we calculate the
overhead in terms of bandwidth and packet size when
encryption is applied for the IPSec scenario, by using
a mathematical framework proposed (Xenakis et al.,
2006). In section 3 the simulation topology and initial
parameters related to average end-to-end delay and
packet loss rates for each codec, are also presented.
In section 4 the main results and discusions are
presented and finally in section 5 we withdraw main
conclusions and areas of future work.
2 QUANTIFY THE ENCRYPTION
OVERHEAD
In terms of quantifying the encryption penalty upon
network transmissions, an extended mathematical
framework has been proposed by Xenakis et al.
(2006). The authors have quantified the impact that
different symmetric ciphers such as DES, 3DES, AES
and hashing algorithms HMAC-SHA1, HMAC-MD5
may impose in terms of communication quality and
consumption (effective bandwidth) used.
The total time for a crypto-engine to encrypt a
plain user packet of specific payload size S
d
with a
processing speed C
p
by using DES, 3DES is:
t
DES
(x,C
p
) =
&
8 S
d
64
'
T
DES/3DES
C
p
(1)
Where T
DES
= 3697 and T
3DES
= 8091 are the num-
ber of operations required to encrypt a block of user
data with these block ciphers. For AES the total time
required to encrypt/decrypt one block of data is given
below (Xenakis et al., 2006):
t
AES
(x,C
p
) =
&
8 S
d
128
'
T
AESenc
C
p
(2)
t
AES
(x,C
p
) =
&
8 S
d
64
'
T
AESdec
C
p
(3)
The processing cycles for encrypt/decrypt a user data
block for a specific key length with AES (Elkeelany
et al., 2002):
T
AESenc
(128) = 6168
T
AESenc
(192) = 7512
T
AESenc
(256) = 8856
T
AESdec
(128) = 10992
T
AESdec
(192) = 13408
T
AESdec
(256) = 15824
The ciphering overhead created by padding the origi-
nal packet in order to create multiple blocks supported
by the ciphers. The additional field added has also
been addressed by the authors as follows:
SP
ESPCNFATH
(S
d
) =
&
S
d
+ 22
Bl
'
Bl + 40 (4)
Where S
d
is the payload size and Bl is the block size
of each cipher used (8 bytes for DES/3DES and 16 for
AES). Table 1, illustrates the codecs used in the sim-
ulations as well as the packet overheads for plain and
encrypted traffic for both modes in IPSec operation.
The total number of packets produced per second for
each codec is given by the following:
PPS(pkts/sec) =
Codec bit rate (bits)
Payload Size (bits)
(5)
The total bandwidth required per VoIP call has been
calculated as follows:
Band(kbps) = Voice pkt size (bits) PPS (6)
During our simulation there is no voice activity de-
tection (VAD) used since this metric can effectively
reduce the utilisation up to 65% of the full rate (Press,
2009). A first observationthroughout our calculations
is that when G.726 (32 kbps) is used with payload size
20 bytes all ciphers examined seem to add exactly the
same overhead in terms of packet size. The total IP
packet for this payload size is 88 and 104 bytes and
the ethernet bandwidth recorded is 265.5 kbps. Sim-
ilar results were extracted in the case of G.726 (24
kbps) with payload size 40 bytes and total IP packet
size of 104 and 136 bytes for AES (both IPSec modes)
and 104 and 128 for DES/3DES. The required band-
width in that case was measured at 121kbps. No dis-
crepancies in terms of packet overhead and ethernet
bandwidth required were noticed either in the case of
G.729 (8 kbps) for payload sizes 10, 20, 40 bytes re-
spectively.
3 SIMULATION TOPOLOGY
An access network topology was designed by us-
ing NS-2 (NS2, 2001) consisting of 300 user agents
(UA) where encryption takes place on an end-to-end
fashion (Transport mode)(figure 1). A total number
of 600 UA were interconnected by using switches
SIGMAP 2010 - International Conference on Signal Processing and Multimedia Applications
18
Table 1: VoIP Ethernet packet overheads for encrypted traffic with AES/DES/3DES and IPSec in two modes of operation.
Codec P.Size[bytes] AES trans. AES tunn. DES/3DES trans. DES/3DES tunn.
G.711 (64 kbps) 120 152 168 144 168
200 232 248 224 248
280 312 328 304 328
G.726 (32 kbps) 60 88 104 88 104
120 136 152 128 144
160 184 216 184 208
G.726 (24 kbps) 120 152 168 144 168
80 104 136 104 128
100 136 152 128 144
G.729 (8 kbps) 50 72 104 72 69
60 88 104 88 104
70 104 120 96 112
80 104 136 104 128
90 120 136 112 136
100 136 152 128 144
G.723.1 (6.3 kbps) 64 88 120 88 112
88 120 136 112 136
G.723.1 (5.3 kbps) 60 88 104 88 104
80 104 136 104 128
and routers and two stateful inspection firewalls at
the core entrance points. A script written in python
has been created that automates the simulation pro-
cess. The simulation starts with an initial configu-
ration stored in a file called parameters.dat that the
python script reads prior to topology generation. Ta-
ble 2 illustrates the initial parameters regarding propa-
gation delay, link capacity, payload size and burst/idle
times. The idle and burst time is based on the Pareto
ON/OFF model and depends totally on each codec in-
dividually.
Table 2: Initial simulation parameters.
P.D.[ms] L.C.[Mb] P.S.[bytes] b./i.[ms]
10 5 160 20-10
The parameters.dat file includes the basic con-
figuration details for G.711 (64 kbps). This file is
used as an input to the PythonTopology.py script that
generates 300 tcl scripts corresponding to each VoIP
call to be simulated. The input file is automatically
accessed by the python script if the simulation pa-
rameters change. We have particularly focused on
DES/3DES and AES with HMAC-SHA1. Once tcl
topologies have been written, the NS-2 simulator is
called and run against each tcl script to extract simu-
lation results. Figure 2 illustrates the simulation pro-
cess.
During the simulations the total buffer queue size
was set to 50 packets and the default first-in-first-out
(FIFO) queue management was implemented (Braden
et al., 1998). The network was overloaded by VoIP
flows gradually increasing from 1 to 300 calls, up
to the congestion level where packets were simply
Figure 1: Simulation topology.
dropped. In addition, packet loss concealment (PLC)
is not employed, therefore, there is no compensation
for dropped packets. We have described packet loss
rate as a multiplicative function of each value of the
packet loss rate at a specific link during a transmis-
sion.
Plr
ij
=
pkts
lost
pkts
received
=
pkts
sent
i
pkts
received
j
pkts
received
j
(7)
We have derived the overall packet loss rate of a route
with several links for unicast transmissions as fol-
lows:
PLR
ij
= 1
fF
Π
ij
(1 Plr
ij
) (8)
Where f denotes a specific traffic flaw within the net-
work flaws F.
PLR
ij
0.05 Pkts
sent
i
(9)
Equation (9) is dirived by the National Institute of
Standards and Technology (NIST) recommendations
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER
DIFFERENT CODING SCHEMES
19
parameters.dat
PythonTopology.py
File1.tcl
File300.tclFile2.tcl
Calling NS-2 Simulator
Out1.tr
Out2.tr Out300.tr
measure_avg.delay.awk
measure_pkt loss_rate.awk
Avg Delay1.dat
Avg Delay2.dat
Avg Delay300.dat
Pkt_loss_rate1.dat
Pkt_loss_rate2.dat
Pkt_loss_rate300.dat
Change Simulation Parameters
Figure 2: Simulation flow chat.
which suggest the total packet loss for a voice call
must not exceed 5% of the total packets transmitted
(Kuhn et al., 2005). Although simulations were car-
ried out based on the maximum number of 300 simul-
taneous calls, there is a point at the delay traces were
packets are simply dropped above the acceptable lim-
its. This investigation focuses only on those call vol-
umes where trasmissions are feasible and within the
limits posted by the International Telecommunication
Union (ITU). The limits posted by ITU-T regarding
one-way delay limits are 0-150ms for most network
applications and 0-200msfor encrypted transmissions
(It, 1993).
4 RESULTS AND DISCUSSION
In this section we present the experimental results of
our simulations based on the ciphers and codecs in-
troduced in section 2. For the sake of brevity only the
most important findings are presented. In the case of
G.711 (64 kbps) with plain traffic, a significant trade-
off between the actual payload size and e2e delay,
as well as e2e delay and packet loss rates has been
recorded. Only one third of the total VoIP calls fed
into the network are feasible since packet loss dra-
matically increases after 100 simultaneous calls.
Although e2e delay seems to be constant and be-
low the limits for an unacceptable call, the packet loss
rates when G.711 (64 kbps) is used, are catastrophic
for the calls above 100 no matter payload size used.
In the case of G.723.1 (5.3 kbps) the majority of calls
are delivered successfuly with minor effects on e2e
delay and packet loss rates. This can be explained
mainly due to the low codec rate and the actual link
capacity. The buffer queue size at 50 pps is also an-
other factor positively contributes to low packet loss
rates. In the case of G.723.1 (6.3 kbps) when the pay-
load size is 24 and 48 bytes the overall average de-
lay and packet loss rates seem to be slightly higher
then G.723.1 (5.3 kbps) and its corresponding pay-
load sizes. Even in that scenario, however, effects on
delay and packet loss rates seem to be negible in com-
parison to G.711 where dropping symptoms are rapid
after 100 VoIP calls.
The smallest payload size used in both cases
seems to create unacceptable dropping rates at the
very early stages of 140 and 60 simultaneous VoIP
calls respectively in the case of G.726. Throughout
the simulations with the selected codecs when pay-
load size of 80 and 120 bytes is used, this modifica-
tion seems to allow more calls into the network prior
to drastic dropping rates. An interesting observation
is that with G.726 (32 kbps) and payload size of 20
bytes the overall packet loss rates are higher than any
other payload used even with the same codec under
different rates. An overall increase of up to 20% drop-
ping rates with 300 VoIP calls has been observed. In
the case of plain voice traffic, G.726 (32 kbps) seems
to perform better with a given payload size of 120
bytes. For the case of G.729 (8 kbps) this codec seems
to inserts the maximum number of VoIP calls into the
network mainly due to its low bit rate and packets pro-
duced per second. A successful delivery of all VoIP
calls with payload sizes of 40, 50 and 60 bytes re-
spectively has recorded. The average e2e delay for
the first three payload sizes gradually increases fol-
lowing a step-wise function behaviour, due to the ag-
gregation of the incoming traffic those payloads cre-
ate in the buffer queue. The default payload size of
10 bytes seems to outperform regarding packets loss
rates since its dropping symptoms exceed 5% of the
total packets submitted after 200 calls.
4.1 Encrypted VoIP Traffic with
DES/3DES and HMAC-SHA1
Figure 3 illustrates average e2e delays and packet loss
rates in the case of encrypted VoIP traffic for G.711
(64 kbps). A direct effect of encryption regarding
G.711 operation is the actual increase on average e2e
delay suffered from all calls fed into the network.
This increase has been measured up to 90 ms higher
then plain traffic with the same codec. Although DES
and 3DES with HMAC-SHA1 are in place, no signif-
icant discripancies were found regarding the two ci-
phers’ effects upon VoIP. The analysis has shown very
SIGMAP 2010 - International Conference on Signal Processing and Multimedia Applications
20
0 50 100 150 200 250 300
0.1
0.15
0.2
0.25
Number of VoIP calls with G.711 (64kbps) for DES & HMAC−SHA1
Avg E2E Delay [sec]
payload80
payload160
payload240
0 50 100 150 200 250 300
0.1
0.15
0.2
0.25
Number of VoIP calls with G.711 (64kbps) for 3DES & HMAC−SHA1
Avg E2E Delay [sec]
payload80
payload160
payload240
(a)
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.711 (64kbps) for DES & HMAC−SHA1
Packet Loss Rate %
payload80
payload160
payload240
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.711 (64kbps) for 3DES & HMAC−SHA1
Packet Loss Rate %
payload80
payload160
payload240
(b)
Figure 3: Average e2e delay and packet loss rates for G.711 (64 kbps) with DES/3DES and HMAC-SHA1.
0 50 100 150 200 250 300
0.12
0.13
0.14
0.15
Number of VoIP calls with G.723.1 (5.3kbps) for DES & HMAC−SHA1
Avg E2E Delay [sec]
payload20
payload40
0 50 100 150 200 250 300
0.12
0.13
0.14
0.15
Number of VoIP calls with G.723.1 (5.3kbps) for 3DES & HMAC−SHA1
Avg E2E Delay [sec]
payload20
payload40
(a)
0 50 100 150 200 250 300
0
2
4
6
Number of VoIP calls with G.723.1 (5.3kbps) for DES & HMAC−SHA1
Packet Loss Rate %]
payload20
payload40
0 50 100 150 200 250 300
0
2
4
6
Number of VoIP calls with G.723.1 (5.3kbps) for 3DES & HMAC−SHA1
Packet Loss Rate %
payload20
payload40
(b)
Figure 4: Average e2e delay and packet loss rates for G.723.1 (5.3 kbps) with DES/3DES and HMAC-SHA1.
similar behaviour in terms of network impairments,
although 3DES is considered to be a computationally
more expensive cipher than DES. Both ciphers used
have managed to allow less feasible VoIP calls into
the network. In figure 3, the overall dropping symp-
toms started at under 50 simultaneous VoIP calls, al-
lowing up to 50 calls into the network within the ac-
ceptable packet loss limits. Figure 4 illustrates the
findings for G.723.1 (5.3 kbps). An increase has been
noticed regarding e2e delay for up to 70ms in com-
parison to plain traffic, mainly due to cryptographic
operations. As the number of VoIP calls increases,
a constant e2e delay recorded up to the level of 200
calls for 20 bytes payload size and 260 calls for 40
bytes. In terms of packet loss rates, for both payload
sizes, no value exceeded 5% for either cipher exam-
ined. The good behaviour of the VoIP traffic, even in
the case where encryption is applied can be partially
explained by the low bit rate of the codec, as well as
the link capacity.
Figure 5 illustrates the average e2e delay and
packet loss rates as measured for G.726 (24 kbps).
An overall e2e delay of 43ms has been added as a
result of the encryption process. In terms of pay-
load sizes, the actual operation of the codec with 80
bytes payload may contribute to higher rates of e2e
delay, however, it seems to feed more calls into the
network (Figure 5). The dropping symptoms based
on this network topology with the existing charac-
teristics are considered to be dramatic after a certain
number of concurrent VoIP calls (60 calls) for all pay-
loads supported. In the case of both DES/3DES, the
overall packet loss rate takes place earlier as the VoIP
call volume increases in comparison to plain traffic,
which is an expected network behaviour due to the
additional overhead introduced. Although the actual
payload size does not by itself constitute an improve-
ment in terms of packet loss rates, however, with en-
cryption in place and G.726 (24 kbps) as the codec se-
lected, the payload of 80 bytes seems to perform bet-
ter. This can be partially explained by the relationship
between the actual packet size and the cryptographic
engine’s throughput. A slightly different behaviour
has been recorded with G.726 (32 kbps) and its small-
est payload size. Although the codec’s operation with
the specific payload size of 20 bytes presents the low-
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER
DIFFERENT CODING SCHEMES
21
0 50 100 150 200 250 300
0.12
0.14
0.16
0.18
Number of VoIP calls with G.726 (24kbps) for DES & HMAC−SHA1
Avg E2E Delay [sec]
payload40
payload60
payload80
0 50 100 150 200 250 300
0.12
0.14
0.16
0.18
Number of VoIP calls with G.726 (24kbps) for 3DES & HMAC−SHA1
Avg E2E Delay [sec]
payload40
payload60
payload80
(a)
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.726 (24kbps) for DES & HMAC−SHA1
Packet Loss Rate %
payload40
payload60
payload80
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.726 (24kbps) for 3DES & HMAC−SHA1
Packet Loss Rate %
payload40
payload60
payload80
(b)
Figure 5: Average e2e delay and packet loss rates for G.726 (24 kbps) with DES/3DES and HMAC-SHA1.
0 50 100 150 200 250 300
0.12
0.14
0.16
0.18
Number of VoIP calls with G.726 (32kbps) for DES & HMAC−SHA1
Avg E2E Delay [sec]
payload20
payload80
payload120
0 50 100 150 200 250 300
0.1
0.12
0.14
0.16
0.18
0.2
Number of VoIP calls with G.726 (32kbps) for 3DES & HMAC−SHA1
Avg E2E Delay [sec]
(a)
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.726 (32kbps) for DES & HMAC−SHA1
Packet Loss Rate %
payload20
payload80
payload120
0 50 100 150 200 250 300
0
10
20
30
Number of VoIP calls with G.726 (32kbps) for 3DES & HMAC−SHA1
Packet Loss Rate %
(b)
Figure 6: Average e2e delay and packet loss rates for G.726 (32 kbps) with DES/3DES and HMAC-SHA1.
est average e2e delay, it seems to have dispropotion-
ally high dropping symptoms in comparison to the
other payloads supported. In the case of encryption
the overall precentage regarding packet loss rates has
been also increased by up to 10%. The average e2e
delay remains constant, mainly due to rapid dropping
symptoms. Similarly, the aggregation of the incom-
ing traffic, as well as the total buffer queue size, has
contributed negatively to the overall packet loss rates.
The area of feasible VoIP calls is illustrated in Fig-
ure 6. An interesting observation is that the encryp-
tion overhead reduces dramatically the total number
of simultaneous VoIP calls fed into the network by
50% for all payload sizes used in comparison to un-
encrypted traffic for the same scenario.
4.2 Encrypted VoIP Traffic with AES
and HMAC-SHA1
A similar investigation has been carried out with VoIP
confidentiality and authentication to be assured with
AES and HMAC-SHA1. Figure 6 shows the average
e2e delay and packet loss rates for G.711 (64 kbps) for
the case of AES and HMAC-SHA1. For all the pay-
load sizes currently supported by the codec, the aver-
age e2e delay does not exceed 200ms for the feasible
area of calls (1-50). The higher e2e delay values have
been recorded with payload size of 160 bytes from
a starting point of 170ms up to nearly 200ms for an
increased number of calls. The default payload size
used by the codec (160 bytes) preserves those values
no matter the key length used. It is clear through-
out the simulation that the payload size of 240 bytes
seems to feed more calls into the network with an ac-
ceptable e2e delay and packet loss rate for the feasi-
ble area investigated. The average e2e delay is up to
150ms whereas payload size 80 bytes seems to record
slightly higher values.
Under the burst traffic conditions, as well as the
network parameters as configured in the tcl simula-
tion scripts, G.723.1 (5.3 kbps) seems to behave bet-
ter in terms of average e2e and packet loss rates when
encryption is applied (Fig. 8). In the case that AES
& HMAC-SHA1 is used, similar delay traces have
been recorded as in the DES/3DES scenario, how-
ever, the delay increase has been reported 50 calls
SIGMAP 2010 - International Conference on Signal Processing and Multimedia Applications
22
0 50 100 150 200 250 300
0
0.1
0.2
Number of VoIP calls with G.711 (64kbps) for AES(128bit) & HMAC−SHA1
Avg E2E Delay [sec]
payload80
payload160
payload240
0 50 100 150 200 250 300
0
0.1
0.2
Number of VoIP calls with G.711 (64kbps) for AES(192bit) & HMAC−SHA1
Avg E2E Delay [sec]
0 50 100 150 200 250 300
0.1
0.15
0.2
Number of VoIP calls with G.711 (64kbps) for AES(256bit) & HMAC−SHA1
Avg E2E Delay [sec]
(a)
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.711 (64kbps) for AES(128bit) & HMAC−SHA1
Packet Loss Rate %
payload80
payload160
payload240
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.711 (64kbps) for AES(192bit) & HMAC−SHA1
Packet Loss Rate %
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.711 (64kbps) for AES(256bit) & HMAC−SHA1
Packet Loss Rate %
(b)
Figure 7: Average e2e delay and packet loss rates for G.711 (64 kbps) with AES and HMAC-SHA1.
0 50 100 150 200 250 300
0.1
0.15
0.2
Number of VoIP calls with G.723.1 (5.3kbps) for AES(128bit) & HMAC−SHA1
Avg E2E Delay [sec]
payload20
payload40
0 50 100 150 200 250 300
0.1
0.15
0.2
Number of VoIP calls with G.723.1 (5.3kbps) for AES(192bit) & HMAC−SHA1
Avg E2E Delay [sec]
0 50 100 150 200 250 300
0.1
0.15
0.2
Number of VoIP calls with G.723.1 (5.3kbps) for AES(256bit) & HMAC−SHA1
Avg E2E Delay [sec]
(a)
0 50 100 150 200 250 300
0
5
10
Number of VoIP calls with G.723.1 (5.3kbps) for AES(128bit) & HMAC−SHA1
Packet Loss Rate %
payload20
payload40
0 50 100 150 200 250 300
0
5
10
Number of VoIP calls with G.723.1 (5.3kbps) for AES(192bit) & HMAC−SHA1
Packet Loss Rate %
0 50 100 150 200 250 300
0
5
10
Number of VoIP calls with G.723.1 (5.3kbps) for AES(256bit) & HMAC−SHA1
Packet Loss Rate %
(b)
Figure 8: Average e2e delay and packet loss rates for G.723.1 (5.3 kbps) with AES and HMAC-SHA1.
earlier. The same behaviour seems to apply for the
dropping symptoms as well. Simply put, in the case
of DES/3DES and payload size of 20 bytes the rapid
dropping symptoms start at 200 calls whereas in the
AES case this behaviour starts 50 calls earlier. In
addition, higher dropping rates have been measured
for AES than DES/3DES for the same payload size.
However, even if AES is used, with this decrease of
the feasible area of VoIP calls, the codec seems to be-
have better than any other codec under investigation
for the same scenarios.
Figure 9 clearly shows the devastating effects of
AES and HMAC-SHA1when G.726 (24 kbps) is used
under the given simulation scenario. The available
area of feasible calls has been reduced to 1-30 si-
multaneous calls, reduced by almost 20 VoIP calls
in comparison to DES/3DES and HMAC-SHA1. An
obvious observation is that every call above the feasi-
ble area is practically impossible, since for a specific
time frame and calls the average e2e delay exceeded
300ms and the corresponding loss rates 35% of the
total number of packets transmitted.
With AES used under pre-defined and strict pa-
rameters reported an overall 10% higher dropping
rates then the higher dropping rate value recorded
with DES/3DES for this codec. This signifies the im-
portance in terms of impact of such modification re-
garding the encryption level even when the payload
size and rates remain constant. The penalty factors
contributing to such behaviour except the actual cryp-
tographic overhead, are the relatively small payload
size, the rate of the codec as well as the aggregation
of the incoming traffic in the buffer queue.
A closer investigation in the area of feasible VoIP
calls with the selected codec, has shown that when
a payload size of 80 bytes is used, the maximum
number of calls is fed into the network with rela-
tively acceptable network impairments suffered dur-
ing the transmission. However, the use of AES as it
is recorded in that case does not constitute a signifi-
cant improvement regarding VoIP call volume deliv-
ery. Finally, even in that particular case, the default
payload size supported by the codec does not seems
to be the most appropriate selection when encryption
is active. Similar results were extracted in the case of
G.726 (32 kbps) and its corresponding payload sizes
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER
DIFFERENT CODING SCHEMES
23
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (24kbps) for AES(128bit) & HMAC−SHA1
Avg E2E Delay [sec]
payload40
payload60
payload80
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (24kbps) for AES(192bit) & HMAC−SHA1
Avg E2E Delay [sec]
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (24kbps) for AES(256bit) & HMAC−SHA1
Avg E2E Delay [sec]
(a)
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (24kbps) for AES(128bit) & HMAC−SHA1
Packet Loss Rate %
payload40
payload60
payload80
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (24kbps) for AES(192bit) & HMAC−SHA1
Packet Loss Rate %
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (24kbps) for AES(256bit) & HMAC−SHA1
Packet Loss Rate %
(b)
Figure 9: Average e2e delay and packet loss rates for G.726 (24 kbps) with AES and HMAC-SHA1.
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (32kbps) for AES(128bit) & HMAC−SHA1
Avg E2E Delay [sec]
payload20
payload80
payload120
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (32kbps) for AES(192bit) & HMAC−SHA1
Avg E2E Delay [sec]
0 50 100 150 200 250 300
0
0.2
0.4
Number of VoIP calls with G.726 (32kbps) for AES(256bit) & HMAC−SHA1
Avg E2E Delay [sec]
(a)
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (32kbps) for AES(128bit) & HMAC−SHA1
Packet Loss Rate %
payload20
payload80
payload120
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (32kbps) for AES(192bit) & HMAC−SHA1
Packet Loss Rate %
0 50 100 150 200 250 300
0
20
40
Number of VoIP calls with G.726 (32kbps) for AES(256bit) & HMAC−SHA1
Packet Loss Rate %
(b)
Figure 10: Average e2e delay and packet loss rates for G.726 (32 kbps) with AES and HMAC-SHA1.
of 20, 80 and 120 bytes. Figure 10 illustrate that the
feasible area of VoIP calls has been reduced to 1-15
and the overall packet loss rates have been increased
above 40% for a specific time frame and payload size.
Although any call above 15 is practically unfeasible,
it is clear from the Figure 10 the tradeoff between the
actual packet size, delay and packet loss rates. The
spiky waveform of the average e2e delay and packet
loss rates is mainly presented due to the codec rate
and its resulting packets per second, as well as the
queuing mechanism (FIFO) used. A comparison be-
tween DES/3DES and AES shows a vast increase in
the actual delay, which has been almost doubled as
recorded during the simulations.
5 CONCLUSIONS
During our simulations an in depth investigation has
been carried out regarding the feasible area of VoIP
calls for each codec examined. We have found that
in the case of G.711 (64 kbps) the encryption can add
up to 90ms average e2e delay for the same streams in
comparison to plain traffic with the same codec. The
area of feasible transmissions has been measured be-
low 45 simultaneous VoIP calls in the case of encryp-
tion with DES/3DES and HMAC-SHA1. Also, the
payload size of 240 bytes recorded the highest feasi-
ble call volume in comparison to other payload sizes
supported by the codec when encryption is applied no
matter the cipher used for the same codec.
In the case of G.726 (24 kbps) and G.726 (32
kbps) the payloads of 80 bytes and 120 bytes respec-
tively seem to perform better in terms of e2e delay
within the area of feasible VoIP calls (1-65), for both
codecs. In contrast, the smallest payload sizes sup-
ported by both codecs have reported higher dropping
symptoms at earlier stages during our simulations.
For G.723.1 (5.3 kbps) and G.723.1 (6.3 kbps), the
payload sizes of 40 bytes and 48 bytes have recorded
the lowest dropping symptoms, although all calls have
managed to feed into the network successfuly. Only
in the case of AES with HMAC-SHA1 has the fea-
sible area of VoIP calls been reduces to 1-200 calls
for G.723.1 (5.3 kbps) and payload 20 bytes and 1-
SIGMAP 2010 - International Conference on Signal Processing and Multimedia Applications
24
260 for payload of 40 bytes. For G.723.1 (6.3 kbps)
and AES with HMAC-SHA1 the area of feasible VoIP
calls has been reduced to 0-160 for payload size of
24 bytes and 1-240 for payload size of 48 bytes.
The dropping rates were almost double than those
recorded with DES/3DES and HMAC-SHA1. In gen-
eral, the crypto-engine seems to perform better with
large payload sizes and, in the majority of the cases
examined, the default payload size shipped with each
codec, is not the appropriate selection when encryp-
tion is concerned.
ACKNOWLEDGEMENTS
Special thanks must go to Nikolaos Pavlidis, from
Information Services Directorate, University of Bed-
fordshire, Dr. Peter Norrington from the Centre for
Excellence in Teaching & Learning (CETL) at the
University of Bedfordshire as well as Dr. Helen Ja-
cobs (Modern-Networks) for all the valuable support
and fruitful ideas during the implementation of this
work. Finally, acknowledgement must be credited to
Engineering and Physical Sciences Research Council
(EPSRC) for the financial support of this project.
REFERENCES
Barbieri, R., Bruschi, D., and Rosti, E. (2002). Voice over
ipsec: Analysis and solutions. Computer Security Ap-
plications Conference, Annual, 0:261.
Benvenuto, M. C. and Keromytis, A. D. (2003). Easyvpn:
Ipsec remote access made easy. In LISA ’03: Proceed-
ings of the 17th USENIX conference on System admin-
istration, pages 87–94, Berkeley, CA, USA. USENIX
Association.
Bohnert, T. and Monteiro, E. (2005). A comment on
simulating lrd traffic with pareto on/off sources. In
CoNEXT ’05: Proceedings of the 2005 ACM confer-
ence on Emerging network experiment and technol-
ogy, pages 228–229, New York, NY, USA. ACM.
Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering, S.,
Estrin, D., Floyd, S., Jacobson, V., Minshall, G., Par-
tridge, C., Peterson, L., Ramakrishnan, K., Shenker,
S., Wroclawski, J., and Zhang, L. (1998). Recom-
mendations on Queue Management and Congestion
Avoidance in the Internet. RFC 2309 (Informational).
Elbayoumy, A. D. and Shepherd, S. J. (2005). Using the tiny
encryption algorithm for securing voice over ip. In
Proceedings of 7th Annual International Symposium
on Advanced Radio Technologies. INSTICC Press.
Elbayoumy, A. D. and Shepherd, S. J. (2007). Stream or
block cipher for securing voip? I. J. Network Security,
5(2):128–133.
Elkeelany, O., Matalgah, M., Sheikh, K., Thaker, M.,
Chaudhry, G., Medhi, D., and Qaddour, J. (2002). Per-
formance analysis of ipsec protocol: encryption and
authentication. ICC, 2(2):3225–3241.
It, U. (1993). ITU-T recommendation G.114. Technical
report, International Telecommunication Union.
Kuhn, D. R., Walsh, T., Fries, S., of Standards, N. I., and
(U.S.), T. (2005). Security considerations for voice
over IP systems [electronic resource] : recommenda-
tions of the National Institute of Standards and Tech-
nology / D. Richard Kuhn, Thomas J. Walsh, Steffen
Fries. U.S. Dept. of Commerce, Technology Admin-
istration, National Institute of Standards and Technol-
ogy, Gaithersburg, MD :.
Li, I.-H. (2008). Effects of on-off variability in two-state
pareto traffic models on multimedia application trans-
mission performance. Networked Computing and Ad-
vanced Information Management, International Con-
ference on, 2:426–431.
NS2 (2001). The Network Simulator ns-2 (v2.1b8a).
http://www.isi.edu/nsnam/ns/.
Press, C. (2006 (accessed September 23, 2009)).
Voice over IP Per Call Bandwidth Consumption.
http://www.cisco.com/warp/public/788/pkt-voice-
general/bwidth consume.pdf.
Radia, P. and Kaufman, C. (2000). Key exchange in ipsec:
Analysis of ike. IEEE Internet Computing, 4:50–56.
Xenakis, C., Laoutaris, N., Merakos, L., and Stavrakakis,
I. (2006). A generic characterization of the overheads
imposed by ipsec and associated cryptographic algo-
rithms. Comput. Netw., 50(17):3225–3241.
AN EXPERIMENTAL ANALYSIS ON ITERATIVE BLOCK CIPHERS AND THEIR EFFECTS ON VOIP UNDER
DIFFERENT CODING SCHEMES
25