Securing Digital Audio using Complex Quadratic Map

M. T. Suryadi, Tjandra Satria Gunawan, Yudi Satria

Research output: Contribution to journalConference articlepeer-review

Abstract

In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

Original languageEnglish
Article number012014
JournalJournal of Physics: Conference Series
Volume974
Issue number1
DOIs
Publication statusPublished - 22 Mar 2018
Event3rd International Conference on Mathematics: Pure, Applied and Computation, ICoMPAC 2017 - Surabaya, Indonesia
Duration: 1 Nov 20171 Nov 2017

Fingerprint

Dive into the research topics of 'Securing Digital Audio using Complex Quadratic Map'. Together they form a unique fingerprint.

Cite this