SlideShare une entreprise Scribd logo
1  sur  13
NOVEL END-TO-END VOICE ENCRYPTION
METHOD IN GSM SYSTEM
Networking, Sensing and Control, 2008. ICNSC 2008.
IEEE International Conference
H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou
Advisor : Dr. Jenq-Shiou Leu
Student:Bing-Syuan Wang
Date:2015/02/11
Outline
• Introduction
• Novel voice encryption method
• Principle of RPE-LTP Vocoder
• Novel Voice Encryption Method
• Encryption Algorithm
• Hardware Module
• Performance
• Conclusion
Introduction
• Common products mostly include:
• Cryptophone from GMSK in Germany
• Snapcell for mobile phone encrypt module
from Snapshield in Israel
• GSM Voice encrypt module from CRYPTOAG
in Sweden
• NSK200 secure phone from KONGSBERG in
Norway
Introduction
• Common end-to-end secure voice communication
have some obvious shortages:
• 1. Data channel connection needs several seconds
• 2. Voice processing delay in the communications
• 3. Cannot be compatible to all GSM networks
Introduction
• The novel encryption method can penetrate the RPE-LTP
(Regular Pulse Excitation-Long Term Prediction) vocoder,
and has the advantages of short time delay.
• RPE-LTP(Regular Pulse Excitation-Long Term Prediction):
• Reduce the amount of data, Vector Quantization…
• GMSK(Gaussian Filtered Minimum Shift Keying)
Principle of RPE-LTP Vocoder
• It includes pretreatment, LPC analysis, short-term
analysis filtering, long-term prediction and Regular Pulse
Excitation sequence coding
• 1. Samples digital voice signal at 8kHz sampling rate
• 2. Removes the direct current component
• 3. Make use of FIR filter
• 4. LPC analysis takes every 160 sample points (20ms)
• 5. Short-time analysis filter produces LPC residual signal
• 6. Remove redundancy farther coding
• 7. Outputs 260 bits coding every frame at last
Novel Voice Encryption Method
• This encryption method must penetrate the RPE-LTP
vocoder
• This new voice encryption method is a kind of signal
source encryption technology
Encryption Algorithm
• Provide M is plaintext, C is cipher text, k is the key, Pk is
encryption matrix generated by k, Qk is the decryption
matrix
• The algorithm is mainly intend to make the encrypted
voice signal be similar to the human natural voice signal
and can penetrate the RPE-LTP vocoder
Hardware Module
• The voice signal enters into the hardware module through
SPI interface. And it put back into the mobile phone
through the SPI to the RPE-LTP module
Performance
• The test to compare the influence on the algorithm
performance with different frame number n is based on
the platform of LeCroy 6100A 1GHZ Oscilloscope.
Performance
• Encryption Intensity and Residential Intelligibility
• Residential Intelligibility:
Performance
• Frequency domain distortion comparisons
• The recovery voice by this means has a little noise
compared with the original voice, and it doesn't affect the
whole hearing effect at all.
Conclusion
• This end-to-end voice encryption method is based on voice
channel
• Average processing time delay is less than 0.8s
• Penetrating to RPE-LTP compression code
• Good compatibility to GSM networks
• Suitable implementation without any change in current GSM
signaling system
• The new encryption method solves the problem that traditional
encryption algorithm cannot be used in voice channel directly
because of RPE-LTP vocoder in GSM system

Contenu connexe

Tendances

How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
Videoguy
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
Fatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Fatih Ozavci
 
I tel mobile dialer
I tel mobile dialerI tel mobile dialer
I tel mobile dialer
smriti2703
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
Suhas Desai
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
Fatih Ozavci
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
Fatih Ozavci
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing Service
Videoguy
 

Tendances (20)

Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Introduction to VoIP Security
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Security
 
I tel mobile dialer
I tel mobile dialerI tel mobile dialer
I tel mobile dialer
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
*astTECS IP PBX
*astTECS IP PBX*astTECS IP PBX
*astTECS IP PBX
 
Wavedigitech presentation-2013
Wavedigitech presentation-2013Wavedigitech presentation-2013
Wavedigitech presentation-2013
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
VOIP
VOIPVOIP
VOIP
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing Service
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheet
 

En vedette

NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
 

En vedette (7)

End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

Similaire à Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System

A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
cscpconf
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
csandit
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
mashiur
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdf
mashiur
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
CPqD
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptx
mashiur
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
Fraj Alshahibi
 

Similaire à Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System (20)

Add-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio PortAdd-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio Port
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
838511959.pptx
838511959.pptx838511959.pptx
838511959.pptx
 
R43019698
R43019698R43019698
R43019698
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdf
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
 
Voip basics
Voip   basicsVoip   basics
Voip basics
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptx
 
Smart home automation using z wave protocol
Smart home automation using z wave protocolSmart home automation using z wave protocol
Smart home automation using z wave protocol
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
VOIP services
VOIP servicesVOIP services
VOIP services
 

Plus de Syuan Wang

Plus de Syuan Wang (7)

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to Arduino
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality Interfaces
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
 

Dernier

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Dernier (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 

Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System

  • 1. NOVEL END-TO-END VOICE ENCRYPTION METHOD IN GSM SYSTEM Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou Advisor : Dr. Jenq-Shiou Leu Student:Bing-Syuan Wang Date:2015/02/11
  • 2. Outline • Introduction • Novel voice encryption method • Principle of RPE-LTP Vocoder • Novel Voice Encryption Method • Encryption Algorithm • Hardware Module • Performance • Conclusion
  • 3. Introduction • Common products mostly include: • Cryptophone from GMSK in Germany • Snapcell for mobile phone encrypt module from Snapshield in Israel • GSM Voice encrypt module from CRYPTOAG in Sweden • NSK200 secure phone from KONGSBERG in Norway
  • 4. Introduction • Common end-to-end secure voice communication have some obvious shortages: • 1. Data channel connection needs several seconds • 2. Voice processing delay in the communications • 3. Cannot be compatible to all GSM networks
  • 5. Introduction • The novel encryption method can penetrate the RPE-LTP (Regular Pulse Excitation-Long Term Prediction) vocoder, and has the advantages of short time delay. • RPE-LTP(Regular Pulse Excitation-Long Term Prediction): • Reduce the amount of data, Vector Quantization… • GMSK(Gaussian Filtered Minimum Shift Keying)
  • 6. Principle of RPE-LTP Vocoder • It includes pretreatment, LPC analysis, short-term analysis filtering, long-term prediction and Regular Pulse Excitation sequence coding • 1. Samples digital voice signal at 8kHz sampling rate • 2. Removes the direct current component • 3. Make use of FIR filter • 4. LPC analysis takes every 160 sample points (20ms) • 5. Short-time analysis filter produces LPC residual signal • 6. Remove redundancy farther coding • 7. Outputs 260 bits coding every frame at last
  • 7. Novel Voice Encryption Method • This encryption method must penetrate the RPE-LTP vocoder • This new voice encryption method is a kind of signal source encryption technology
  • 8. Encryption Algorithm • Provide M is plaintext, C is cipher text, k is the key, Pk is encryption matrix generated by k, Qk is the decryption matrix • The algorithm is mainly intend to make the encrypted voice signal be similar to the human natural voice signal and can penetrate the RPE-LTP vocoder
  • 9. Hardware Module • The voice signal enters into the hardware module through SPI interface. And it put back into the mobile phone through the SPI to the RPE-LTP module
  • 10. Performance • The test to compare the influence on the algorithm performance with different frame number n is based on the platform of LeCroy 6100A 1GHZ Oscilloscope.
  • 11. Performance • Encryption Intensity and Residential Intelligibility • Residential Intelligibility:
  • 12. Performance • Frequency domain distortion comparisons • The recovery voice by this means has a little noise compared with the original voice, and it doesn't affect the whole hearing effect at all.
  • 13. Conclusion • This end-to-end voice encryption method is based on voice channel • Average processing time delay is less than 0.8s • Penetrating to RPE-LTP compression code • Good compatibility to GSM networks • Suitable implementation without any change in current GSM signaling system • The new encryption method solves the problem that traditional encryption algorithm cannot be used in voice channel directly because of RPE-LTP vocoder in GSM system

Notes de l'éditeur

  1. 減少資料量、向量化 GSMK調製的信號頻譜緊湊、誤碼特性好,在數位移動通信中得到了廣泛使用 GMSK調製技術是從MSK GMSK GMSK (Minimum Shift Keying)調製的基礎上發展起來的一種數位調製方式,其特點是在資料流程送交頻率調製器前先通過一個Gauss濾波器(預調製濾波器)進行預調製濾波,以減小兩個不同頻率的載波切換時的跳變能量,使得在相同的資料傳輸速率時頻道間距可以變得更緊密。由於數位信號在調製前進行了Gauss預調製濾波,調製信號在交越零點不但相位連續,而且平滑過濾,因此GSMK調製的信號頻譜緊湊、誤碼特性好,在數位移動通信中得到了廣泛使用,如廣泛使用的GSM(Global System for Mobile communication)移動通信體制就是使用GMSK調製方式。
  2. 有限脈衝響應濾波器是數位濾波器的一種,簡稱FIR數位濾波器(finite impulse response filter)。這類濾波器對於脈衝輸入信號的響應最終趨向於0,因此是有限的,而得名。它是相對於無限脈衝響應濾波器(IIR)而言。由於無限脈衝響應濾波器中存在反饋迴路,因此對於脈衝輸入信號的響應是無限延續的。 線性預測編碼(LPC)是主要用於音頻信號處理與語音處理中根據線性預測模型的信息用壓縮形式表示數字語音信號譜包絡(en:spectral envelope)的工具。它是最有效的語音分析技術之一,也是低位速下編碼方法高質量語音最有用的方法之一,它能夠提供非常精確的語音參數預測。
  3. McBSP包括一個資料通道和一個控制通道,通過7個引腳與外部設備連接。資料發送引腳DX負責資料的發送,資料接收引腳DR負責資料的接收,發送時鐘引腳CLKX,接收時鐘引腳CLKR,發送幀同步引腳FSX和接收幀同步引腳FSR提供串列時鐘和控制信號。 McBSP 是英文Multichannel Buffered Serial Port (多通道緩衝串列口)的縮寫 McBSP是TI公司生產的數位信號處理晶片的多通道緩衝串列口。McBSP是在標準序列介面的基礎之上對功能進行擴展,因此,具有與標準序列介面相同的基本功能。 它可以和其他DSP器件、編碼器等其他串口器件通信。 Synchronous 同步電路
  4. 在密碼學中,算法的密鑰空間是指一組可被用來生成密鑰的所有可能的密鑰,並且是最重要的屬性之一,用於確定密碼系統的強度 DES 1976年被美國聯邦政府的國家標準局確定為聯邦資料處理標準(FIPS) 3DES相當於用兩個(2TDES)或三個(3TDES)不同的金鑰對資料進行三次DES加密。3DES被認為是十分安全的,雖然它的速度較慢 在2001年,DES作為一個標準已經被高階加密標準(AES)所取代
  5. 不需要data channel 中國移動