A proposed speech scrambling based on hybrid chaotic key generators

Due to great progress in wireless communication and the existence of public channel, through which the information transferred among users, the problem related to information security increased, especially the eavesdropping and attacking of these information. These facts required the increase of the security levels of the used cryptosystems techniques in order to prevent the attacking of transmitted information, Based on chaotic maps, this paper provides a new proposed speech scrambling system based on using a hybrid use of different chaotic maps Logistic and Henon. Each chaotic map will generate key that will be used in speech scrambling. the comparison of the system with normal speech scrambler based on using only one chaotic map. Shows good level of security.

[1]  Jing Liu,et al.  A Speech Chaotic Encryption Algorithm Based on Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  Predrag Cvitanović A Two-dimensional Mapping with a Strange Attractor , 2017 .

[3]  Jacques M. Bahi,et al.  Improving random number generators by chaotic iterations application in data hiding , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[4]  Bashir Alam,et al.  Chaos Based Mixed Keystream Generation for Voice Data Encryption , 2014, ArXiv.

[5]  Marc Theberge Security evaluation of transform domain speech scramblers , 1996 .

[6]  Jaafar Qassim Kadhim جعفر قاسم كاظم,et al.  Speech Scrambling Employing Lorenz Fractional Order Chaotic System , 2013 .

[7]  Larry A. Pace,et al.  Beginning R: An Introduction to Statistical Programming , 2012 .

[8]  Nagy W. Messiha,et al.  Chaotic encryption of speech signals in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.

[9]  M. Hénon,et al.  A two-dimensional mapping with a strange attractor , 1976 .

[10]  Sattar B. Sadkhan,et al.  Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication , 2015 .

[11]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[12]  Georgiana Mateescu,et al.  A hybrid approach of system security for small and medium enterprises: Combining different cryptography techniques , 2013, 2013 Federated Conference on Computer Science and Information Systems.

[13]  Wieslaw Marszalek,et al.  A hybrid chaos-based pseudo-random bit generator in VHDL-AMS , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).

[14]  Yihong Du,et al.  The Logistic Equation , 2006 .

[15]  Sattar B. Sadkhan Al Maliky,et al.  Chaos-Based Cryptography for Voice Secure Wireless Communication , 2014 .

[16]  Varghese Paul,et al.  A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications , 2011 .

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..