Security & Encryption
A white paper on the importance of encryption in TDM and VoIP networks
Encryption for security is thousands of years old. With the invention of telephone networks, it was inevitable that forms of encryption would be developed to keep communications secret. Radio networks made encryption critical, since the transmissions were easily intercepted.
Governments, militaries, and banks have employed encryption for decades. While encryption equipment was clumsy and expensive, those transferring critical data and voice had no other option.
Historically, the act of intercepting voice calls (“wire tapping”) required a physical connection, often near the source, which made the interception of voice calls difficult. So there was a balance between risk and cost.
Voice over IP (VoIP) however, has ushered in a new level of concern for loss of secrecy. The protocol itself is publicly available, making it easy to hack. With worldwide interconnected networks, spies can tap into the “connection” from anywhere. Even the tools to find and intercept calls are free! No longer can any business or government agency take the risk of not employing encryption; luckily, the cost of encryption in modern IP networks is very low.
Download the White Paper
To read more, click here to download REDCOM’s Security & Encryption White Paper. This document will guide those who are not IT or VoIP experts through the confusing world of securing their networks with encryption. It includes the following topics:
- The Basis of Encryption: Algorithms and Keys
- Encryption Architectures
- Legacy Encryption
- VoIP Encryption (including TLS and SRTP)
- V.150.1 for Proprietary Encryption Devices
- Network Security by Design
- Firewalls and SBCs