Comparative Study of Speech Encryption Algorithms Using Mobile Applications

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - July Issue 2013 by IJCTT Journal
Volume-4 Issue-7                           
Year of Publication : 2013
Authors :Jaspreet kaur, Er. Kanwal preet Singh

MLA

Jaspreet kaur, Er. Kanwal preet Singh"Comparative Study of Speech Encryption Algorithms Using Mobile Applications"International Journal of Computer Trends and Technology (IJCTT),V4(7):2346-2350 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Speech communication is most popular now days. Everyone wants secure communication that’s way use encrypts and decrypt data scheme. It is basically used for military and business purpose. People want high security level during their communication..The numbers of algorithms are used for speech encryption and decryption. However in this paper the work is done on three different kinds of algorithms i.e. NTRU, RSA and RINJDAEL these three popular algorithms are used for speech encryption and decryption approach. Basically NTRU and RSA algorithms are asymmetric in nature and RINJDAEL algorithm is symmetric in nature. In speech encryption, first the speech is converted into text then further the text is converted into cipher text. The cipher text is sent to be particular receiver in which transmitter want to communicate. At the receiver end, receiver receives the original data through decryption process. At the end the performance is analyzed of these three approaches respectively. The parameters calculated are Encryption, Decryption and Delay time, complexity, and packet lost, Security level. In this three approaches, Encryption, decryption and delay time, are varying according to the number of bits per seconds. On the Other hand, complexity and packet lost are approximately same. There is no packet lost during transmitting and receiving the data. After the analysis of these three algorithms, The NTRU algorithm is faster in encryption and decryption time than others algorithms. The security level are very high than other algorithms. The android platform are used for these three algorithm to find the results in which algorithm took less time for encrypt or decrypt the data and help to evaluate the performance in speech encryption algorithms.

 

References-
[1]“SpeechSignal”Onlineavailableatwww.cs.haifa.ac.il/~nimrod/Com pression/Speech/S1Basics2010.pdf
[2] A. Jameel et al, “A robust secure speech communication system using ITU-T G.723.1 and TMS320C6711 DSP”, Microprocessors and Microsystems, volume 30,2006,Pages 26-32.
[3] A. Jameel, “Transform-domain and DSP based secure speech communication”, Microprocessors and Microsystems, 2007, 335–346.
[4] Akella Amarendra Babu et al “Robust speech processing in EW environment”, International Journal of Computer Applications (0975 – 8887) Volume 38– No.11, January 2012
[5] Venkatesh Krishnan “A Framework For Low Bit-Rate Speech Coding In Noisy Environment”, A school of Electrical and Computer Engineering
[6] Ashok Kumar Nanda, Prof. Lalit Kumar Awasthi “SMS Security Using NTRU Cryptosystem for M-Commerce”,May 2012
[7] Raj Kumar G.V.S. Naveen Kumar K, Chandra Sekhar P, Bhargav Nunna V. V. S., Vinod Kumar B“Modified Mutual Authentication and Keyagreement Protocol based on Ntrucryptography for wireless communications”, International Journal of Computer Science and Network (IJCSN)Volume 1, Issue 4, August 2012.
[8] P.Saveetha & S.Arumugam, “Study on Improvement in RSA Algorithm and its Implementation”, International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, Volume-3, Issue- 6, 7, 8, 2012.
[9] Xin Zhou, Xiaofei Tang, “Research and implementation of RSA algorithm for encryption and decryption” IEEE 24 August 2011.
[10] Challa Narasimham, Jayaram Pradhan “Evaluation of Performance Characteristics of Cryptosystem using Text files”, Journal of Theoretical and Applied Information Technology, May 2008

Keywords : — NTRU, RSA and RINJDAEL algorithms, Speech cryptography.