DOI QR코드

DOI QR Code

Reliable and Secure Voice Encryption over GSM Voice Channel

  • Lee, Hoon-Jae (Div. of Computer and Information Engineering, Dongseo University) ;
  • Jang, Won-Tae (School of Computer and Information Engineering at Dongseo University) ;
  • Kim, Tae-Yong (Dongseo University)
  • Received : 2009.09.23
  • Accepted : 2009.11.13
  • Published : 2010.02.28

Abstract

In this paper, we study and develope a special secure Dongle to be adapted in GSM SmartPhone for secure voice communication to the serial 20-pin connector in SmartPhone. We design and implement the Dongle module hardware, firmware, and software including cipher crypto-synchronization and cipher algorithm. Also we study and emulate the SmartPhone GUI software interface including communication software module to the Dongle. Finally, we analyze the performances of crypto-synchronization in some noisy environment and also we test the secure Dongle module.

Keywords

References

  1. F. P. Preparata and M. I. Shames, Computational Geometry: An Introduction, Springer-Velag, 1985.
  2. Lee, H., Chen, K. 2007. PingPong-128, An New Stream Cipher for Ubiquitous Application. IEEE CS (ICCIT 2007), pp.1893-1899.
  3. Lee, H. 1997. An Improved Synchronous Stream cipher system for a Link Encryption. PhD thesis in KyungPook National University, Daegu, Korea.
  4. Menezes, A., Oorschot, P. Van, Vanstone, S. 1997. Handbook of Applied Cryptography, CRC Press.
  5. Tilborg, H.C.A. 2000. Fundamentals of Cryptology. Kluwer Academic Publishers.
  6. Beker, H.J., and Piper, F.C. 1985. Secure Speech Communications. Academic Press, London.
  7. A.J. Menezes, P.C. Oorschot and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  8. J. L. Massey, "Shift-Register Synthesis and BCH Decoding," IEEE Trans. on Infor. Theo., Vol. IT-15, No. 1, pp. 122-127, Jan. 1969.
  9. A. Biryikov and A. Shamir, "Cryptanalytic Time/Memory/Data Tradcoffs for Stream Ciphers", Advances in Cryptology, Proceedings of ASIACRYPT00, LNCS 1976, pp.1-13, 2000.
  10. Chen, K., Henrickson, M., Millan, W., Puller, J., Simpson, A., Dawson, E., Lee, H., Moon, S. 2004. Dragon: A Fast Word Based Stream Cipher. LNCS Vol. 3506 (ICISC'2004), pp.414-431.
  11. Clark, A., Dawson, E., Fuller, J., Golic, J., Lee, H., Millan, W., Moon, S., Simpson, L. 2002. The LlLl-H Keystream Generator. LNCS Vol. 2384(ACISP'2002), pp.25-39.
  12. Lee, H., Moon, S. 2002. Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing Vol.82, No.2, pp.259-265. https://doi.org/10.1016/S0165-1684(01)00180-3
  13. Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T. 2000. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography, pp. 39-56.
  14. ARIA. http://www.nsri.re.kr.
  15. NIST. 2001. Announcing the Advanced Encryption Standard (AES). FIPS-197