A blind source separation based cryptography scheme for mobile military communication applications

Security in digital transmission is an increasingly interesting topic in a number of fields. In many cases however, the need for security is forfeited due to the high complexity of commonly used cryptosystems. The use of the underdetermined source separation problem as a basis for a cryptographic mechanism has recently been proposed. Many cryptographic algorithms, such as public key algorithms which based a common military application, use as a basis intractable number theory problems (such as integer factorization and exponentiation). Underdetermined blind source separation is also shown to have the potential to serve this purpose, as the difficulties of deriving an analytic solution to this problem have been extensively documented. This paper presents a study of blind source separation based encryption, proposes some further improvements in approaches that have already been presented and illustrates the application of the improved algorithms in the paradigm of secure speech communication. The proposed scheme is related to Independent Component Analysis Concepts. A preliminary cryptanalysis study is presented that verifies the adequacy of the new scheme for use in mobile military communication units and other applications where security is critical. The proposed scheme is also shown to be immune to some of the attacks to which existing methods were believed to be vulnerable.

[1]  Peter Stavroulakis TErrestrial Trunked RAdio - TETRA: A Global Security Tool , 2007 .

[2]  José Antonio Apolinário,et al.  Speech privacy for modern mobile communication systems , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[4]  Faramarz Fekri,et al.  Public-key cryptography using paraunitary matrices , 2006, IEEE Transactions on Signal Processing.

[5]  Faramarz Fekri,et al.  A block cipher cryptosystem using wavelet transforms over finite fields , 2004, IEEE Transactions on Signal Processing.

[6]  Bharat K. Bhargava,et al.  A scheme for privacy-preserving data dissemination , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[7]  John A. MacDonald Cellular authentication & key agreement for service providers , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.

[8]  Min Wu,et al.  A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.

[9]  Hualou Liang,et al.  A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[10]  A. Drigas,et al.  Adaptive encryption protocols , 2005 .

[11]  Qiu-Hua Lin,et al.  Secure image communication using blind source separation , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[12]  Athanasios Drigas,et al.  Stream Ciphers created by a Discrete Dynamic System for application in the Internet , 2004 .

[13]  Guanrong Chen,et al.  Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[14]  Jooheung Lee,et al.  Block-based frequency scalable technique for efficient hierarchical coding , 2006, IEEE Transactions on Signal Processing.

[15]  Ramiro Jordan,et al.  Wireless communications and networking: an overview , 2002 .

[16]  Rashid Ansari,et al.  Robust Data Hiding in Audio Using Allpass Filters , 2007, IEEE Transactions on Audio, Speech, and Language Processing.

[17]  Dr. N. G BARDIS Method for designing pseudorandom binary sequences generators on Nonlinear Feedback Shift Register ( NFSR ) , 2004 .

[18]  S. Behbahani,et al.  Transmitting Encrypted Data by Wavelet Transform and Neural Network , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[19]  Andrzej Cichocki,et al.  Neural networks for optimization and signal processing , 1993 .

[20]  Enrico Magli,et al.  Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.

[21]  Scott T. Rickard,et al.  A general framework for extending classic array processing techniques to the underdetermined blind source separation problem , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.

[22]  Andreas Willig,et al.  Recent and Emerging Topics in Wireless Industrial Communications: A Selection , 2008, IEEE Transactions on Industrial Informatics.

[23]  Kun Liu,et al.  Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.

[24]  Athanasios Drigas,et al.  Quantum Key Distribution and Adaptive Protocols. , 2004 .