Browse > Article
http://dx.doi.org/10.6109/jicce.2010.8.1.064

Reliable and Secure Voice Encryption over GSM Voice Channel  

Lee, Hoon-Jae (Div. of Computer and Information Engineering, Dongseo University)
Jang, Won-Tae (School of Computer and Information Engineering at Dongseo University)
Kim, Tae-Yong (Dongseo University)
Abstract
In this paper, we study and develope a special secure Dongle to be adapted in GSM SmartPhone for secure voice communication to the serial 20-pin connector in SmartPhone. We design and implement the Dongle module hardware, firmware, and software including cipher crypto-synchronization and cipher algorithm. Also we study and emulate the SmartPhone GUI software interface including communication software module to the Dongle. Finally, we analyze the performances of crypto-synchronization in some noisy environment and also we test the secure Dongle module.
Keywords
GSM phone security; Crypto dongle; PingPong-128; synchronization; stream cipher;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T. 2000. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography, pp. 39-56.
2 ARIA. http://www.nsri.re.kr.
3 NIST. 2001. Announcing the Advanced Encryption Standard (AES). FIPS-197
4 Beker, H.J., and Piper, F.C. 1985. Secure Speech Communications. Academic Press, London.
5 A.J. Menezes, P.C. Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
6 J. L. Massey, "Shift-Register Synthesis and BCH Decoding," IEEE Trans. on Infor. Theo., Vol. IT-15, No. 1, pp. 122-127, Jan. 1969.
7 A. Biryikov and A. Shamir, "Cryptanalytic Time/Memory/Data Tradcoffs for Stream Ciphers", Advances in Cryptology, Proceedings of ASIACRYPT00, LNCS 1976, pp.1-13, 2000.
8 Chen, K., Henrickson, M., Millan, W., Puller, J., Simpson, A., Dawson, E., Lee, H., Moon, S. 2004. Dragon: A Fast Word Based Stream Cipher. LNCS Vol. 3506 (ICISC'2004), pp.414-431.
9 Clark, A., Dawson, E., Fuller, J., Golic, J., Lee, H., Millan, W., Moon, S., Simpson, L. 2002. The LlLl-H Keystream Generator. LNCS Vol. 2384(ACISP'2002), pp.25-39.
10 Lee, H., Moon, S. 2002. Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing Vol.82, No.2, pp.259-265.   DOI   ScienceOn
11 F. P. Preparata and M. I. Shames, Computational Geometry: An Introduction, Springer-Velag, 1985.
12 Lee, H., Chen, K. 2007. PingPong-128, An New Stream Cipher for Ubiquitous Application. IEEE CS (ICCIT 2007), pp.1893-1899.
13 Lee, H. 1997. An Improved Synchronous Stream cipher system for a Link Encryption. PhD thesis in KyungPook National University, Daegu, Korea.
14 Tilborg, H.C.A. 2000. Fundamentals of Cryptology. Kluwer Academic Publishers.
15 Menezes, A., Oorschot, P. Van, Vanstone, S. 1997. Handbook of Applied Cryptography, CRC Press.