End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Title | End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Hayati, N., Suryanto, Y., Ramli, K., Suryanegara, M. |
Conference Name | 2019 2nd International Conference on Communication Engineering and Technology (ICCET) |
Keywords | cellular radio, cellular technologies, chaotic algorithm, chaotic communication, chaotic cryptography, cryptography, dynamic keys, Encryption, end-to-end voice encryption, Global System for Mobile, GSM, GSM network, military radio, multicircular permutations, multiple circular, multiple circular chaotic permutation, pubcrawl, Receivers, security systems, telecommunication security, telecommunication technology, trunked radio, voice communication, voice data security, voice encryption, wireless mobile communication |
Abstract | Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible. |
DOI | 10.1109/ICCET.2019.8726890 |
Citation Key | hayati_end–end_2019 |
- military radio
- wireless mobile communication
- voice encryption
- voice data security
- voice communication
- trunked radio
- telecommunication technology
- telecommunication security
- security systems
- Receivers
- multiple circular chaotic permutation
- multiple circular
- multicircular permutations
- chaotic cryptography
- GSM network
- GSM
- Global System for Mobile
- end-to-end voice encryption
- encryption
- dynamic keys
- Cryptography
- chaotic communication
- chaotic algorithm
- cellular technologies
- cellular radio
- pubcrawl