SlideShare a Scribd company logo
1 of 13
NOVEL END-TO-END VOICE ENCRYPTION
METHOD IN GSM SYSTEM
Networking, Sensing and Control, 2008. ICNSC 2008.
IEEE International Conference
H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou
Advisor : Dr. Jenq-Shiou Leu
Student:Bing-Syuan Wang
Date:2015/02/11
Outline
• Introduction
• Novel voice encryption method
• Principle of RPE-LTP Vocoder
• Novel Voice Encryption Method
• Encryption Algorithm
• Hardware Module
• Performance
• Conclusion
Introduction
• Common products mostly include:
• Cryptophone from GMSK in Germany
• Snapcell for mobile phone encrypt module
from Snapshield in Israel
• GSM Voice encrypt module from CRYPTOAG
in Sweden
• NSK200 secure phone from KONGSBERG in
Norway
Introduction
• Common end-to-end secure voice communication
have some obvious shortages:
• 1. Data channel connection needs several seconds
• 2. Voice processing delay in the communications
• 3. Cannot be compatible to all GSM networks
Introduction
• The novel encryption method can penetrate the RPE-LTP
(Regular Pulse Excitation-Long Term Prediction) vocoder,
and has the advantages of short time delay.
• RPE-LTP(Regular Pulse Excitation-Long Term Prediction):
• Reduce the amount of data, Vector Quantization…
• GMSK(Gaussian Filtered Minimum Shift Keying)
Principle of RPE-LTP Vocoder
• It includes pretreatment, LPC analysis, short-term
analysis filtering, long-term prediction and Regular Pulse
Excitation sequence coding
• 1. Samples digital voice signal at 8kHz sampling rate
• 2. Removes the direct current component
• 3. Make use of FIR filter
• 4. LPC analysis takes every 160 sample points (20ms)
• 5. Short-time analysis filter produces LPC residual signal
• 6. Remove redundancy farther coding
• 7. Outputs 260 bits coding every frame at last
Novel Voice Encryption Method
• This encryption method must penetrate the RPE-LTP
vocoder
• This new voice encryption method is a kind of signal
source encryption technology
Encryption Algorithm
• Provide M is plaintext, C is cipher text, k is the key, Pk is
encryption matrix generated by k, Qk is the decryption
matrix
• The algorithm is mainly intend to make the encrypted
voice signal be similar to the human natural voice signal
and can penetrate the RPE-LTP vocoder
Hardware Module
• The voice signal enters into the hardware module through
SPI interface. And it put back into the mobile phone
through the SPI to the RPE-LTP module
Performance
• The test to compare the influence on the algorithm
performance with different frame number n is based on
the platform of LeCroy 6100A 1GHZ Oscilloscope.
Performance
• Encryption Intensity and Residential Intelligibility
• Residential Intelligibility:
Performance
• Frequency domain distortion comparisons
• The recovery voice by this means has a little noise
compared with the original voice, and it doesn't affect the
whole hearing effect at all.
Conclusion
• This end-to-end voice encryption method is based on voice
channel
• Average processing time delay is less than 0.8s
• Penetrating to RPE-LTP compression code
• Good compatibility to GSM networks
• Suitable implementation without any change in current GSM
signaling system
• The new encryption method solves the problem that traditional
encryption algorithm cannot be used in voice channel directly
because of RPE-LTP vocoder in GSM system

More Related Content

What's hot

Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyChristopher Duffy
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP VideoVideoguy
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceFatih Ozavci
 
I tel mobile dialer
I tel mobile dialerI tel mobile dialer
I tel mobile dialersmriti2703
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Ozavci
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open SourceSuhas Desai
 
*astTECS IP PBX
*astTECS IP PBX*astTECS IP PBX
*astTECS IP PBX*astTECS
 
Wavedigitech presentation-2013
Wavedigitech presentation-2013Wavedigitech presentation-2013
Wavedigitech presentation-2013Wave Digitech
 
Spying The Wire
Spying The WireSpying The Wire
Spying The WireDon Anto
 
Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3Wave Digitech
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411arafatix
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopFatih Ozavci
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceVideoguy
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetNam TruongGiang
 

What's hot (20)

Voice Over IP Overview w/Secuirty
Voice Over IP Overview w/SecuirtyVoice Over IP Overview w/Secuirty
Voice Over IP Overview w/Secuirty
 
How To Successfully Implement IP Video
How To Successfully Implement IP VideoHow To Successfully Implement IP Video
How To Successfully Implement IP Video
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and DefenceHardware Hacking Chronicles: IoT Hacking for Offence and Defence
Hardware Hacking Chronicles: IoT Hacking for Offence and Defence
 
Introduction to VoIP Security
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Security
 
I tel mobile dialer
I tel mobile dialerI tel mobile dialer
I tel mobile dialer
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
I N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  SourceI N T E R O P09  Suhas  Desai  Secure  Your  Vo I P  Network With  Open  Source
I N T E R O P09 Suhas Desai Secure Your Vo I P Network With Open Source
 
*astTECS IP PBX
*astTECS IP PBX*astTECS IP PBX
*astTECS IP PBX
 
Wavedigitech presentation-2013
Wavedigitech presentation-2013Wavedigitech presentation-2013
Wavedigitech presentation-2013
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3Difference bw android4.2 to android 4.3
Difference bw android4.2 to android 4.3
 
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
 
VOIP
VOIPVOIP
VOIP
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411Grentech hotel wi fi solution 20140411
Grentech hotel wi fi solution 20140411
 
The Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 WorkshopThe Art of VoIP Hacking - Defcon 23 Workshop
The Art of VoIP Hacking - Defcon 23 Workshop
 
HEAnets' Video Conferencing Service
HEAnets' Video Conferencing ServiceHEAnets' Video Conferencing Service
HEAnets' Video Conferencing Service
 
Điện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheetĐiện thoại ip không dây Yealink w53P datasheet
Điện thoại ip không dây Yealink w53P datasheet
 

Viewers also liked

End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsJeff Lambert
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationGovindarrajan NV
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...Alex Tan
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 

Viewers also liked (7)

End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

Similar to NOVEL END-TO-END VOICE ENCRYPTION FOR GSM

Add-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio PortAdd-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio PortIiro Jantunen
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...adil raja
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansLiving Online
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...cscpconf
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...csandit
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdfmashiur
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdfmashiur
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
 
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEMNadeem Choudhary
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lteCPqD
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptxmashiur
 
Smart home automation using z wave protocol
Smart home automation using z wave protocolSmart home automation using z wave protocol
Smart home automation using z wave protocolManje Gowda
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP) Namra Afzal
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIPFraj Alshahibi
 

Similar to NOVEL END-TO-END VOICE ENCRYPTION FOR GSM (20)

Add-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio PortAdd-on 5kHz Inductive Link for Mobile Phones Using Audio Port
Add-on 5kHz Inductive Link for Mobile Phones Using Audio Port
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
 
838511959.pptx
838511959.pptx838511959.pptx
838511959.pptx
 
R43019698
R43019698R43019698
R43019698
 
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and TechniciansPractical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
Practical Fundamentals of Voice over IP (VoIP) for Engineers and Technicians
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
A NEW SYSTEM ON CHIP RECONFIGURABLE GATEWAY ARCHITECTURE FOR VOICE OVER INTER...
 
ETE405-lec4.pdf
ETE405-lec4.pdfETE405-lec4.pdf
ETE405-lec4.pdf
 
ETE405-lec8.pdf
ETE405-lec8.pdfETE405-lec8.pdf
ETE405-lec8.pdf
 
Digital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptx
 
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 
8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte8 the path to voice over lte - vo lte
8 the path to voice over lte - vo lte
 
Voip basics
Voip   basicsVoip   basics
Voip basics
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
ETE405-lec8.pptx
ETE405-lec8.pptxETE405-lec8.pptx
ETE405-lec8.pptx
 
Smart home automation using z wave protocol
Smart home automation using z wave protocolSmart home automation using z wave protocol
Smart home automation using z wave protocol
 
Voice over internet protocol (VoIP)
 Voice over internet protocol (VoIP)  Voice over internet protocol (VoIP)
Voice over internet protocol (VoIP)
 
Voice Quality Metrics in VoIP
Voice Quality Metrics in VoIPVoice Quality Metrics in VoIP
Voice Quality Metrics in VoIP
 
VOIP services
VOIP servicesVOIP services
VOIP services
 

More from Syuan Wang

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to ArduinoSyuan Wang
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Syuan Wang
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Syuan Wang
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesSyuan Wang
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesSyuan Wang
 

More from Syuan Wang (7)

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to Arduino
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM ...
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality Interfaces
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

NOVEL END-TO-END VOICE ENCRYPTION FOR GSM

  • 1. NOVEL END-TO-END VOICE ENCRYPTION METHOD IN GSM SYSTEM Networking, Sensing and Control, 2008. ICNSC 2008. IEEE International Conference H.F. Qi, X.H. Yang, R. Jiang, B. Liang and S.J. Zhou Advisor : Dr. Jenq-Shiou Leu Student:Bing-Syuan Wang Date:2015/02/11
  • 2. Outline • Introduction • Novel voice encryption method • Principle of RPE-LTP Vocoder • Novel Voice Encryption Method • Encryption Algorithm • Hardware Module • Performance • Conclusion
  • 3. Introduction • Common products mostly include: • Cryptophone from GMSK in Germany • Snapcell for mobile phone encrypt module from Snapshield in Israel • GSM Voice encrypt module from CRYPTOAG in Sweden • NSK200 secure phone from KONGSBERG in Norway
  • 4. Introduction • Common end-to-end secure voice communication have some obvious shortages: • 1. Data channel connection needs several seconds • 2. Voice processing delay in the communications • 3. Cannot be compatible to all GSM networks
  • 5. Introduction • The novel encryption method can penetrate the RPE-LTP (Regular Pulse Excitation-Long Term Prediction) vocoder, and has the advantages of short time delay. • RPE-LTP(Regular Pulse Excitation-Long Term Prediction): • Reduce the amount of data, Vector Quantization… • GMSK(Gaussian Filtered Minimum Shift Keying)
  • 6. Principle of RPE-LTP Vocoder • It includes pretreatment, LPC analysis, short-term analysis filtering, long-term prediction and Regular Pulse Excitation sequence coding • 1. Samples digital voice signal at 8kHz sampling rate • 2. Removes the direct current component • 3. Make use of FIR filter • 4. LPC analysis takes every 160 sample points (20ms) • 5. Short-time analysis filter produces LPC residual signal • 6. Remove redundancy farther coding • 7. Outputs 260 bits coding every frame at last
  • 7. Novel Voice Encryption Method • This encryption method must penetrate the RPE-LTP vocoder • This new voice encryption method is a kind of signal source encryption technology
  • 8. Encryption Algorithm • Provide M is plaintext, C is cipher text, k is the key, Pk is encryption matrix generated by k, Qk is the decryption matrix • The algorithm is mainly intend to make the encrypted voice signal be similar to the human natural voice signal and can penetrate the RPE-LTP vocoder
  • 9. Hardware Module • The voice signal enters into the hardware module through SPI interface. And it put back into the mobile phone through the SPI to the RPE-LTP module
  • 10. Performance • The test to compare the influence on the algorithm performance with different frame number n is based on the platform of LeCroy 6100A 1GHZ Oscilloscope.
  • 11. Performance • Encryption Intensity and Residential Intelligibility • Residential Intelligibility:
  • 12. Performance • Frequency domain distortion comparisons • The recovery voice by this means has a little noise compared with the original voice, and it doesn't affect the whole hearing effect at all.
  • 13. Conclusion • This end-to-end voice encryption method is based on voice channel • Average processing time delay is less than 0.8s • Penetrating to RPE-LTP compression code • Good compatibility to GSM networks • Suitable implementation without any change in current GSM signaling system • The new encryption method solves the problem that traditional encryption algorithm cannot be used in voice channel directly because of RPE-LTP vocoder in GSM system

Editor's Notes

  1. 減少資料量、向量化 GSMK調製的信號頻譜緊湊、誤碼特性好,在數位移動通信中得到了廣泛使用 GMSK調製技術是從MSK GMSK GMSK (Minimum Shift Keying)調製的基礎上發展起來的一種數位調製方式,其特點是在資料流程送交頻率調製器前先通過一個Gauss濾波器(預調製濾波器)進行預調製濾波,以減小兩個不同頻率的載波切換時的跳變能量,使得在相同的資料傳輸速率時頻道間距可以變得更緊密。由於數位信號在調製前進行了Gauss預調製濾波,調製信號在交越零點不但相位連續,而且平滑過濾,因此GSMK調製的信號頻譜緊湊、誤碼特性好,在數位移動通信中得到了廣泛使用,如廣泛使用的GSM(Global System for Mobile communication)移動通信體制就是使用GMSK調製方式。
  2. 有限脈衝響應濾波器是數位濾波器的一種,簡稱FIR數位濾波器(finite impulse response filter)。這類濾波器對於脈衝輸入信號的響應最終趨向於0,因此是有限的,而得名。它是相對於無限脈衝響應濾波器(IIR)而言。由於無限脈衝響應濾波器中存在反饋迴路,因此對於脈衝輸入信號的響應是無限延續的。 線性預測編碼(LPC)是主要用於音頻信號處理與語音處理中根據線性預測模型的信息用壓縮形式表示數字語音信號譜包絡(en:spectral envelope)的工具。它是最有效的語音分析技術之一,也是低位速下編碼方法高質量語音最有用的方法之一,它能夠提供非常精確的語音參數預測。
  3. McBSP包括一個資料通道和一個控制通道,通過7個引腳與外部設備連接。資料發送引腳DX負責資料的發送,資料接收引腳DR負責資料的接收,發送時鐘引腳CLKX,接收時鐘引腳CLKR,發送幀同步引腳FSX和接收幀同步引腳FSR提供串列時鐘和控制信號。 McBSP 是英文Multichannel Buffered Serial Port (多通道緩衝串列口)的縮寫 McBSP是TI公司生產的數位信號處理晶片的多通道緩衝串列口。McBSP是在標準序列介面的基礎之上對功能進行擴展,因此,具有與標準序列介面相同的基本功能。 它可以和其他DSP器件、編碼器等其他串口器件通信。 Synchronous 同步電路
  4. 在密碼學中,算法的密鑰空間是指一組可被用來生成密鑰的所有可能的密鑰,並且是最重要的屬性之一,用於確定密碼系統的強度 DES 1976年被美國聯邦政府的國家標準局確定為聯邦資料處理標準(FIPS) 3DES相當於用兩個(2TDES)或三個(3TDES)不同的金鑰對資料進行三次DES加密。3DES被認為是十分安全的,雖然它的速度較慢 在2001年,DES作為一個標準已經被高階加密標準(AES)所取代
  5. 不需要data channel 中國移動