Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication

Abstract It is well known that the wireless communications have great challenges in ensuring high security, due to the great facilities in attacking the communication channels. Hence there is continues trends towards finding a suitable approach to ensure high security for wireless communication. One of such approaches was with the application of chaos theory in cryptosystems. This paper provides a presentation for a proposed random Unified chaotic map as PRBG and its application in digital voice encryption. The proposed voice encryption system is testing with subjective and objective tests to check the performance of proposed random map. The test results are good. The simulation of the proposed scheme has been implemented using MATLAB (R2013a) programming language.

[1]  A. Srinivasan,et al.  A Review of Analog Audio Scrambling Methods for Residual Intelligibility , 2012 .

[2]  Wang Jian,et al.  A Secure Communication System with Multiple Encryption Algorithms , 2010, 2010 International Conference on E-Business and E-Government.

[3]  Lahcene Merah,et al.  A pseudo random number generator based on the chaotic system of Chua's circuit, and its real time FPGA implementation , 2013 .

[4]  K. Ganesan,et al.  Look-up Table Based Chaotic Encryption of Audio Files , 2006, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems.

[5]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[6]  Ahmed S. Elwakil,et al.  Implementation of a Chaotically Encrypted Wireless Communication System , 2009, 2009 IEEE International Conference on Communications.

[7]  Fathi E. Abd El-Samie,et al.  Encryption of speech signal with multiple secret keys in time and transform domains , 2010, Int. J. Speech Technol..

[8]  Nagy W. Messiha,et al.  Chaotic encryption of speech signals in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  S. S. Karimi Madahi,et al.  Speech Signal Encryption Using Chaotic Symmetric Cryptography , 2012 .

[11]  Bashir Alam,et al.  Chaos Based Mixed Keystream Generation for Voice Data Encryption , 2014, ArXiv.

[12]  Marc Theberge Security evaluation of transform domain speech scramblers , 1996 .

[13]  Ali Kanso,et al.  Self-shrinking chaotic stream ciphers , 2011 .

[14]  Jianguo Jiang,et al.  Multimedia Security: A Survey of Chaos-Based Encryption Technology , 2012 .

[15]  Jonathan Blackledge,et al.  Multi-algorithmic Cryptography using Deterministic Chaos with Applications to Mobile Communications , 2008 .

[16]  Jing Liu,et al.  A Speech Chaotic Encryption Algorithm Based on Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[17]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[18]  K. Prasadh,et al.  Audio encryption using higher dimensional chaotic map , 2009 .

[19]  Ed Dawson,et al.  Speech encryption using discrete orthogonal transforms , 1990, International Conference on Acoustics, Speech, and Signal Processing.

[20]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[21]  Xiqin Wang,et al.  Weak key analysis for chaotic cipher based on randomness properties , 2012, Science China Information Sciences.