A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture

In this paper, a new cryptographic method is proposed, designed for audio files’ security. The encryption algorithm is based on classic symmetric models using pseudo-random number generator composed with chaotic circle map and modified rotation equations. The scheme of a new pseudo-random generator is presented and used as basis for chaotic bit-level permutations and substitutions applied to audio files structure for successful encryption. The audio encryption and decryption algorithms are described and explained. Proving the high level of security we provide extensive cryptographic analysis including key sensitivity analysis, key-space analysis, waveform and spectrogram analysis, correlation analysis, number of sample change rate analysis, level of noise analysis and speed performance test.

[1]  S. Ramakrishnan,et al.  Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..

[2]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[3]  Ayman M. Abdalla,et al.  An Audio Shuffle-Encryption Algorithm , 2014 .

[4]  Krasimir Kordov,et al.  Using Circle Map for Audio Encryption Algorithm , 2017 .

[5]  Krasimir Kordov Modified pseudo-random bit generation scheme based on two circle maps and XOR function , 2015 .

[6]  Juliano B. Lima,et al.  Audio encryption based on the cosine number transform , 2016, Multimedia Tools and Applications.

[7]  Borislav Stoyanov,et al.  Using circle map in pseudorandom bit generation , 2014 .

[8]  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Application , 2001 .

[9]  Eman Hato,et al.  Lorenz and Rossler Chaotic System for Speech Signal Encryption , 2015 .

[10]  J. Abdul Samath,et al.  Cryptographically Secure Diffusion Sequences—An Attempt to Prove Sequences Are Random , 2019 .

[11]  Christos Skiadas Mathematical Models of Chaos , 2005 .

[12]  Hongjun Liu,et al.  Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .

[13]  Krasimir Kordov Modified Chebyshev map based pseudo-random bit generator , 2014 .

[14]  James Demmel,et al.  IEEE Standard for Floating-Point Arithmetic , 2008 .

[15]  SOCIETY , 2008, Society.

[16]  H. Rohling,et al.  Comparison of Two Algorithms for Signal Detection in Pulsarbased FSR , 2018, 2018 19th International Radar Symposium (IRS).

[17]  K. Kordov,et al.  Signature Attractor Based Pseudorandom Generation Algorithm , 2015 .

[18]  Dmitriy A. Belkin,et al.  Novel normalization technique for chaotic Pseudo-random number generators based on semi-implicit ODE solvers , 2017, 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS).

[19]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[20]  Christos H. Skiadas,et al.  Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms , 2008 .

[21]  Borislav Stoyanov,et al.  Pseudo-random bit generation algorithm based on Chebyshev polynomial and Tinkerbell map , 2014 .