TY - GEN
T1 - End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
AU - Hayati, Nur
AU - Suryanto, Yohan
AU - Ramli, Kalamullah
AU - Suryanegara, Muhammad
N1 - Funding Information:
This research publication is funded by PIT9 Universitas Indonesia. Ms Hayati is in PhD study supported by Beasiswa Unggulan Dosen Indonesia Dalam Negeri (BUDI-DN), Lembaga Pengelola Dana Pendidikan (LPDP), Cooperation between Ministry of Research and Higher Education and Ministry of Finance of the Republic of Indonesia.
Funding Information:
ACEOLNWK MENDG T isTh research publication is funded by PIT9 Universitas Indonesia. Ms ayH ati is in D Ph study suopp rted by Beasisaw Unugg lan oD sen Indonesia alamD Negeri IBUD( emL baga Penelg ola Dana Pendidikan ,P)P(L Cooerp ation betew en inM istry of Research and Higeh r Education and Ministry of Finance of the Reup blic of Indonesia.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/4/1
Y1 - 2019/4/1
N2 - Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.
AB - Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.
KW - chaotic algorithm
KW - GSM network
KW - multiple circular
KW - trunked radio
KW - voice encryption
UR - http://www.scopus.com/inward/record.url?scp=85068012232&partnerID=8YFLogxK
U2 - 10.1109/ICCET.2019.8726890
DO - 10.1109/ICCET.2019.8726890
M3 - Conference contribution
AN - SCOPUS:85068012232
T3 - 2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
SP - 148
EP - 151
BT - 2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Communication Engineering and Technology, ICCET 2019
Y2 - 12 April 2019 through 15 April 2019
ER -