End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation

Nur Hayati, Yohan Suryanto, Kalamullah Ramli, Muhammad Suryanegara

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Voice communication is an important need in daily activities whether delivered with or without technology. Telecommunication technology has accommodated this need by providing a wide range of infrastructure, including large varieties of devices used as intermediary and end devices. One of the cellular technologies that is very widely used by the public is GSM (Global System for Mobile), while in the military, trunked radio is still popular. However, the security systems of GSM and trunked radio have limitations. Therefore, this paper proposes a platform to secure voice data over wireless mobile communication by providing end-to-end encryption. This platform is robust to noise, real-time and remains secure. The proposed encryption utilizes multicircular permutations rotated by expanded keys as dynamic keys to scramble the data. We carry out simulations and testbed implementation to prove that application of the proposed method is feasible.

Original languageEnglish
Title of host publication2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages148-151
Number of pages4
ISBN (Electronic)9781728114392
DOIs
Publication statusPublished - 1 Apr 2019
Event2nd International Conference on Communication Engineering and Technology, ICCET 2019 - Nagoya, Japan
Duration: 12 Apr 201915 Apr 2019

Publication series

Name2019 2nd International Conference on Communication Engineering and Technology, ICCET 2019

Conference

Conference2nd International Conference on Communication Engineering and Technology, ICCET 2019
Country/TerritoryJapan
CityNagoya
Period12/04/1915/04/19

Keywords

  • chaotic algorithm
  • GSM network
  • multiple circular
  • trunked radio
  • voice encryption

Fingerprint

Dive into the research topics of 'End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation'. Together they form a unique fingerprint.

Cite this