Browse > Article

A Study on the design of voice cryptograph system  

Choi, Tae-Sup (School of Electrical Engineering, Kookmin University)
Ahn, In-Soo (Dept. of Electronics Engineering, Bucheon College)
Publication Information
Abstract
In this paper, we studied the voice cryptograph system designed by the SEED algorithm for the safe transmission and receipt on the voice communication. Voice band signal converts to digital signal by the CODEC and DSP that applied the improved SEED algorithm encrypt the digital signal. The CODEC convert Encryption signal into analog voice signal. This voice signal is transmitted safely because of encryption signal even if someone wiretap. Receiver can hear the source voice, because the encryption signal decrypted using the SEED algorithm. In this paper, We designed the 32 round key instead of 16 round key in the SEED algorithm so that we improve the truncated differential probability from $2^{-143.1}$ to $2^{-286.6}$
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 송문빈, 고명관, 정연모, 'SEED 암호화 알고리즘의 하드웨어 구현', 한국정보처리학회, 2000년도 추계학술발표논문집 제7권 제2호, pp. 1453-1456, 2000
2 Texas Instruments Inc., TMS320C54x Evaluation Module, 1995
3 Eli Biham and Adi Shamir, 'Differential cryptanalysis of the full 16 round DES', In Ernest F. Brickell, editor, Advance in Cryptology-Ccrypto'92, vol.740 of Leture Notes in Computer Science, pp.487-496, Springer-Verlag, Berlin, 1993
4 이민섭, '현대암호학', 교우사, pp.145-152, 1999
5 박창섭, '암호 이론과 보안', 대영사, pp.41-57, 1999
6 '128비트 블록 암호 표준 SEED', 한국정보보호센터, pp.14, 1998
7 '128비트 블록 암호알로리즘(SEED) 개발 및 분석 보고서', 한국정보보호센터, pp.1-21, 1998
8 Mitsuri Matsui, 'New structure of block ciphers with provable security against defferential and linear cryptanalysis', In Deiter Gollman, editor, Fast Software Encryption, Third International Workshop, vol.1039 of Lecture Notes in Computer Science, pp.205-218, Springer-Verlag, Berlin, 1996
9 Thomsa P.Barnwell III, 'Speech Coding A Computer Laboratory Textbook', John Willy & Sons Inc., 1996
10 Eli Biham and Adi Shamir, 'Differential cryptanalysis of DES-like cryptosystems', Journal of cryptology, vol.4, no.1, pp.3-72, 1991
11 Mitsuri Matsui, 'Linear cryptanalysis method for DES cipher', In Tor Helleseth, editor, Advances in Crytology-Eurocrypt'93, vol.765 of Lecture Notes in Computer Science, pp.386-397, Springer-Verlag, Berlin, 1994