Visible to the public A Secure Voice Channel using Chaotic Cryptography Algorithm

TitleA Secure Voice Channel using Chaotic Cryptography Algorithm
Publication TypeConference Paper
Year of Publication2018
AuthorsRiyadi, Munawar A., Khafid, M. Reza Aulia, Pandapotan, Natanael, Prakoso, Teguh
Conference Name2018 International Conference on Electrical Engineering and Computer Science (ICECOS)
Keywordsasynchronous communication, chaotic communication, chaotic cryptographic algorithm, chaotic cryptography, chaotic cryptography algorithm, chiper feedback, Cipher feedback mode, Ciphers, communicaiton channel prototype, composability, cryptography, decryption process, eavesdropping, encrypted channel, Encryption, encryption process, encryption-decription cycle, field programmable gate arrays, FPGA Spartan-3, high processing speed, nonecrypted channel, Predictive Metrics, pubcrawl, Receivers, Resiliency, secure voice channel, secure voice communications channel, secured channel, secured communication channel, Spartan-3 FPGA board, telecommunication security, time 202.0 mus, unwanted eavesdropping, voice communication, voice messages
AbstractA secure voice communications channel is on demand to avoid unwanted eavesdropping of voice messages. This paper reports the development of communicaiton channel prototype equipped with Chaotic cryptographic algorithm with Cipher Feedback mode, implemented on FPGA due to its high processing speed and low delay required for voice channel. Two Spartan-3 FPGA board was used for the purpose, one as transmitter in encryption process and the other as receiver of decryption process. The experimental tests reveal that the voice channel is successfully secured using the encryption-decription cycle for asynchronous communication. In the non-ecrypted channel, the average values of MSE, delay, and THD-N parameters are 0.3513 V2, 202 ms, and 17.52%, respectively, while the secured channel produce MSE of 0.3794 V2, delay 202 ms, and THD-N 20.45%. Therefore, the original information sent in the encrypted channel can be restored with similar quality compared to the non-encrypted channel.
DOI10.1109/ICECOS.2018.8605229
Citation Keyriyadi_secure_2018