Security enhancement for AES encrypted speech in communications

International Journal of Speech Technology - Tập 20 - Trang 163-169 - 2017
Emad Mossa1
1Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menofia University, Menouf, Egypt

Tóm tắt

This paper introduces a secure speech communication approach, which is based on encryption and authentication. This system is based on Advanced Encryption Standard (AES) for encryption and private image database for enhancement of encryption and for authentication. The idea of this cryptosystem is based on XOR of one image from image database with the clear speech before encryption and embedding the index number of this image in the database as a least significant bit watermark into speech. A comparison study is held between the AES block cipher algorithm and the proposed algorithm. This proposed cryptosystem used to enhance the security of AES algorithm and increase its immunity to brute force attacks. It used also to provide authentication and enhance security by addition of extra key which don’t need to be exchanged between parts depending on the embedded image. The extra proposed step remove residual intelligibility from clear speech and fill the silent periods within speech conversation and help in destroy format and pitch information. Security analyses are presented for the proposed cryptosystem from a strict cryptographic viewpoint. Experimental results verify and prove that the proposed cryptosystem is highly secure from the cryptographic viewpoint.

Tài liệu tham khảo

Ahmed, H. E. D. H., Kalash, H. M., & Allah, O. S. F. (2007). An efficient chaos-based feedback stream cipher (ECBFSC) for image encryption and decryption. Informatica, 31(1), 121–129. Ahmed, N., Natarajan, T., & Rao, K. R. (1974). Discrete cosine transform. IEEE transactions on Computers, C-23, 90–93. Behnia, S., Akhshani, A., Mahmodi, H., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons & Fractals, 35(2), 408–419. Boulmalf, M., Barka, E., & Lakas, A. (2007). Analysis of the effect of security on data and voice traffic in WLAN. Computer Communications, 30, 2468–2477. Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 58(2), 83–91. Daemen, J., & Rijndael, V. R. (2001). The advanced encryption standard. Dr. Dobb’s J., 26(3), 137–139. Dalmisli, K. V., Ors, B. (2009). Design of new tiny circuits for AES encryption algorithm. In 3rd International conference on signals, circuits and systems (SCS) (pp. 1–5) El-Samie, F. E. A. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12(1), 27–45. Farhan, S., Khan, S., & Jamal, H. (2004). Mapping of high-bit algorithm to low-bit for optimized hardware implementation. In 16th IEEE international conference on microelectronics (ICM 2004) (pp. 148–151). Feldhofer, M., Wolkerstorfer, J., & Rijmen, V. (2005). AES implementation on a grain of sand. IEE Proceedings of Information Security, 152(1), 13–20. Hamalainen, P., Alho, T., Hannikainen, M., & Hamalainen, T. D. (2006). Design and implementation of low-area and low-power aes encryption hardware core. In 9th euromicro conference on digital system design: Architectures, methods and tools (pp. 577–583). Kuo, C. J. (1993). Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging, 2(4), 345–351. Li, S., Chen, G., & Zheng, X. (2004). Chaos-based encryption for digital images and videos. In Multimedia security handbook, Chap. 4. Boca Raton, FL: CRC Press Li, S., Chen, G., & Zheng, X. (2004). Chaos-based encryption for digital images and videos. In Multimedia security handbook, Chap. 4. Boca Raton, FL: CRC Press Luanlan (2011). The AES Encryption and Decryption Realization Based on FPGA. In Seventh international conference on computational intelligence and security (CIS) (pp. 603–607). Mao, Y. B., & Chen, G. (2005). Chaos-based image encryption. In E. Bayro (Ed.), Handbook of computational geometry for pattern recognition, computer vision, neuralcomputing and robotics (pp. 231–265). Piscataway: IEEE. Mao, Y. B., Chen, G., & Lian, S. G. (2004). A novel fast image encryption scheme based on the 3D chaotic baker map. International Journal of Bifurcation and Chaos, 14(10), 3613–3624. National Bureau of Standards. (1977). Data encryption standard, federal information processing standards Publication no.46, U.S. Government Printing Office, Washington, DC. National Institute of Standards and Technology. (2001). The advanced encryption standard. Federal information processing standards publication (FIPS) 197, November 26. Palmieri, F., & Fiore, U. (2009). Providing true end-to-end security in converged voice over IP infrastructures. Computers & Security, 28, 433–449. Pramstaller, N., Mangard, S., Dominikus, S., & Wolkerstorfer, J. (2005). Efficient “AES implementations on ASICs and FPGAs”. In Proceedings of the 4th conference on the advanced encryption standard (AES 2004) (pp. 98–112). Bonn, Germany, May 10–12, 2005. Shannon, C. E. (1949). Communication theory of secrecy system. Bell System Technical Journal, 28, 656–715. Sinha, A., & Singh, K. (2003). A technique for image encryption using digital signature. Optics communications, 218(4), 229–234.