loading
Documents

Research.Publish.Connect.

Paper

Authors: Cristina-Loredana Duta 1 ; Laura Gheorghe 2 and Nicolae Tapus 1

Affiliations: 1 University Politehnica of Bucharest, Romania ; 2 Academy of Romanian Scientists, Romania

ISBN: 978-989-758-209-7

Keyword(s): Digital Signal Processor, Voice Encryption, Blackfin Processor, TMS320C6X Processor, AES, RSA, NTRU.

Abstract: In the last decades, digital communications and network technologies have been growing rapidly, which makes secure speech communication an important issue. Regardless of the communication purposes, military, business or personal, people want a high level of security during their conversations. In this context, many voice encryption methods have been developed, which are based on cryptographic algorithms. One of the major issues regarding these algorithms is to identify those that can ensure high throughput when dealing with reduced bandwidth of the communication channel. A solution is to use resource constrained embedded systems because they are designed such that they consume little system resources, providing at the same time very good performances. To fulfil all the strict requirements, hardware and software optimizations should be performed by taking into consideration the complexity of the chosen algorithm, the mapping between the selected architecture and the cryptographic algor ithm, the selected arithmetic unit (floating point or fixed point) and so on. The purpose of this paper is to compare and evaluate based on several criteria the Digital Signal Processor (DSP) implementations of three voice encryption algorithms in real time. The algorithms can be divided into two categories: asymmetric ciphers (NTRU and RSA) and symmetric ciphers (AES). The parameters taken into consideration for comparison between these ciphers are: encryption, decryption and delay time, complexity, packet lost and security level. All the previously mentioned algorithms were implemented on Blackfin and TMS320C6x processors. Making hardware and software level optimizations, we were able to reduce encryption/decryption/delay time, as well as to reduce the energy consumed. The purpose of this paper is to determine which is the best system hardware (DSP platform) and which encryption algorithm is feasible, safe and best suited for real-time voice encryption. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.226.251.205

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Duta, C.; Duta, C.; Gheorghe, L. and Tapus, N. (2017). Real-time DSP Implementations of Voice Encryption Algorithms.In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 439-446. DOI: 10.5220/0006208304390446

@conference{icissp17,
author={Cristina{-}Loredana Duta. and Cristina{-}Loredana Duta. and Laura Gheorghe. and Nicolae Tapus.},
title={Real-time DSP Implementations of Voice Encryption Algorithms},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={439-446},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006208304390446},
isbn={978-989-758-209-7},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Real-time DSP Implementations of Voice Encryption Algorithms
SN - 978-989-758-209-7
AU - Duta, C.
AU - Duta, C.
AU - Gheorghe, L.
AU - Tapus, N.
PY - 2017
SP - 439
EP - 446
DO - 10.5220/0006208304390446

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.