Visible to the public End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation

TitleEnd-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Publication TypeConference Paper
Year of Publication2019
AuthorsHayati, N., Suryanto, Y., Ramli, K., Suryanegara, M.
Conference Name2019 2nd International Conference on Communication Engineering and Technology (ICCET)
Keywordscellular radio, cellular technologies, chaotic algorithm, chaotic communication, chaotic cryptography, cryptography, dynamic keys, Encryption, end-to-end voice encryption, Global System for Mobile, GSM, GSM network, military radio, multicircular permutations, multiple circular, multiple circular chaotic permutation, pubcrawl, Receivers, security systems, telecommunication security, telecommunication technology, trunked radio, voice communication, voice data security, voice encryption, wireless mobile communication
Abstract

Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.

DOI10.1109/ICCET.2019.8726890
Citation Keyhayati_end–end_2019