Symmetric Encryption Algorithm in Speech Coding for Defence Communications
نویسندگان
چکیده
In battlefield, messages must be encrypted to provide protection from enemy interception. Several speech coding algorithms have been developed to provide secure communications. FS1015 LPC in 1984, FS1016 CELP in 1991and FS MELP in 1997 became official federal standards. In 2002, the US DoD adopted enhanced MELP (MELPe). Later on in 2007, US Naval Research Laboratories have designed Variable Data Rate (VDR) voice processor. Although certain degree of inherent security is ensured in all the above coding algorithms by way of compression techniques, strength of security in these algorithms is weak as the codecs using the above algorithms are vulnerable to interception. Explicit encryption gadgets need to be provided as accessory to provide strong secure communications. In this paper, we have described an algorithm which provides robust and secure communications. This Robust Secure Coder (RSC) is backward compatible with the existing codec’s and operates at marginally higher bit rates when switched to secure mode.
منابع مشابه
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملDVSI Application of Vocoders
The need for increased utilization of available wireless communication spectrum has fueled the development of voice coding technology. From simple waveform coding techniques operating at 64 kbps, the advance of speech coding algorithms has produced communication quality systems at 2 kbps and below. This allows up to 32 communications channels to operate in the bandwidth formerly occupied by one...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملSpeech encryption and encoding in vlsi pdf
Speech encoding and encryption in VLSI, Published by ACM.Abstract In this paper, an image encryptiondecryption algorithm and its VLSI architecture are proposed. Fourier-Transform Based Speech Encryption.AbstractThis paper proposes a hardware-based speech. Public-key cryptography, the two keys are called the private key and. The VLSI implementation is.International journal of VLSI design Communi...
متن کامل