Browse > Article
http://dx.doi.org/10.33778/kcsa.2021.21.4.015

Digital voice data security techniques with secret key distribution function applicable to military communication  

Im Sung Yeal (부산대학교/교양교육원)
Publication Information
Abstract
Security of voice communication content in the military's voice communication network will be essential. There is no proposed study on voice data security of military communication networks, but security of voice data will be essential when communicating. This paper is about to an encryption/decryption technique of digital voice data to provide security in case of voice calls in a military communication network. In addition, by using a symmetric key algorithm using AES, a secret key is required, and it has the function of transmitting this key to the receiving end before setting it as a voice call, solving the difficulty of distributing the secret key. This paper proposes a security technique for digital voice data that applies a synchronous stream encryption method that is relatively easy to restore synchronization even in the event of loss of synchronization among stream encryption techniques.
Keywords
synchronous stream cipher; voice data encryption; voice data decryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 William Stallings, "Cryptography and Network Security", Pearson Education Inc., pp.15-17, 2013. 
2 Behrouz A. Forouzan," Data communications and Netrworking," Focal Press, pp103-104, 2003. 
3 N.S. Jayant, and P. Noll,"Digital Coding of Waveforms," Mcgrawhill, pp 120-129,, 2007. 
4 NIST, "Announcing the Advanced Encryption Standard(AES)," FIPS PUB-197, Nov., 2001. 
5 Daemon, J., and Ri men, V., "Rijndael: The Advanced Encryption Standard," Dr Dobb's Journal, Mar., 2001. 
6 E. Biham, "New types of cryptanalytic attacks using related keys," Advances in Cryptology, Proceedings Eurocrypt'93, NCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 398-409, 1993. 
7 Daemen, J., and Rijmen, V. "The Design of Rijndael: The Wide Trail Strategy Explained," NewYork,Springer-Verlag, 2002. 
8 William Stallings, "Cryptography and Network Security", Pearson Education Inc., pp.185-192, 2013. 
9 David Austerberry" Video & Audio Streaming," Focal Press, pp.101-102, 2003