Realization of Audio Encryption using Elliptic Curve
This paper uses Elliptic Curve Cryptography (ECC) to encrypt audio. Smaller key size is the main feature of ECC that secures highly compared to other methods. A proposed model is based on ECC, 2D Logistic-Lorenz chaotic map and hash function. The parameters of the model are generated using secrete file between the Tx and Rx. A proof of quality is achieved through several tests that grantee a high performance and security.
Artan Luma, Besnik Selimi and Lirim Ameti, ‘Using Elliptic Curve Encryption and Decryption for Securing Audio Messages’, Oct. 2015, DOI: 10.1007/978-94-017-9804-4_42.
Imad El Hanouti and Hakim El Fadili, ‘Security analysis of an audio data encryption scheme based on key chaining and DNA encoding’, Oct. 2019,
Than Myo Zaw, Min Thant and S. V. Bezzateev, ‘Database Security with AES Encryption, Elliptic Curve Encryption and Signature’, 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), Saint-Petersburg, Russia, IEEE, June 2019.
Yuling Luo, Xue Ouyang, Junxiu Liu and Lvchen Cao, ‘An Image Encryption Method Based on EllipticCurve Elgamal Encryption and Chaotic Systems’, IEEE Access, Vol. 7, IEEE, March 2019, pp: 38507 – 38522.
Shubhi Gupta, Swati Vashisht, Divya Singh and Pradeep kushwaha, ‘Enhancing Big Data Security using Elliptic CurveCryptography’, 2019 International Conference on Automation, Computational and Technology Management (ICACTM), London, United Kingdom, IEEE, April 2019.
Víctor Gayoso Martínez, Luis Hernández-Álvarez and Luis Hernández Encinas, ‘Analysis of the Cryptographic Tools for Blockchain and Bitcoin’, mathematics, MDPI, Vol. 8, Iss. 1, 2020, 14 pages.
Raffaele Martino and Alessandro Cilardo, ‘SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey’, IEEE Access, Vol. 8, IEEE, Feb. 2020, pp. 28415 – 28436.
S. F. El‑Zoghdy, Hala S. El‑sayed andOsama S. Faragallah, ‘Transmission of Chaotic‑based Encrypted Audio Through OFDM’, Wireless Personal Communications, Springer, Feb. 2020,
Nabil Abdoun, Safwan El Assad, Olivier Deforges, Rima Assaf and Mohamad Khalil ‘Design and security analysis of two robust keyed hash functions based on chaotic neural networks’, Journal of Ambient Intelligence and Humanized Computing, Springer, Feb. 2019.
Ramiro Alvarez and Mehrdad Nojoumian, ‘Comprehensive survey on privacy-preserving protocols for sealed-bid auctions’, Computers & Security, Elsevier, Vol. 88, 2020, pp: 1-14.
F.J. Farsana, V.R. Devi and K. Gopakumar, ‘An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams’, Applied Computing and Informatics, Elsevier.
S. J. Sheela, K. V. Suresh and Deepaknath Tandur, ‘A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding’, Journal of Computer Networks and Communications, Hindawi, Vol. 2017, Aug. 2017.
Prabir Kumar Naskar, Soumya Paul, Dipta Nandy and Atal Chaudhuri,’ DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data’, Multimedia Tools and Applications, Vol. 78, Springer, pp. 25019–25042, 2019.
P. Sathiyamurthi and S. Ramakrishnan, ‘Speech encryption using chaotic shift keying for secured speech communication’, EURASIP Journal on Audio, Speech, and Music Processing, Springer, 2017.
F. J. Farsana and K. Gopakumar, ‘Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams’, Advances in Mathematical Physics, Hindawi, Vol. 2020, 12 pages, 2020.
P. Sathiyamurthi and S. Ramakrishnan, ‘Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map’, Multimedia Tools and Applications, Springer, 2020.
Ajithkumar Vyasarao, ‘Elliptic Curve Cryptography’, CYSINFO Cyber Security Meetup, 17th Sept. 2016.
Darrel Hankerson, Alfred Menezes and Scott Vanstone, ‘Guide to Elliptic Curve Cryptography’, Ch. 1, Springer, 2004, pp: 1 – 24.
Kelly Bresnahan, ‘Elliptic Curve Cryptography’, March 24, 2016, pp: 1-102.
https://www.geeksforgeeks.org/hashing-set-1-introduction/ last visit March 2020.
Michael Cross, ‘The Lorenz Model’, Ch. 1, http://www.cmp.caltech.edu/~mcc/Chaos_Course/Lesson1/Lorenz.pdf, Dec. 24, 1999, pp: 1 – 9, last visit March 2020.
Roayat Ismail Abdelfatah, Mohamed E. Nasr and Mohammed A. Alsharqawy, ‘Encryption for Multimedia Based on Chaotic Map: Several Scenarios’, Multimedia Tools and Applications, Springer, 2020.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.