100 research outputs found

    Simple Secrecy: Analog Stream Cipher for Secure Voice Communication

    Get PDF
    Voice signals are inherently analog, and some voice communication systems still utilize analog signals. Existing analog cryptographic methods do not satisfactorily provide cryptosecurity for communication systems due to several limitations. This paper proposes a novel means of provided cryptosecurity for analog signals without digitization; thereby avoiding the latency which results from ADC/DAC conversions. This method utilizes the principles of the digital stream cipher, generating instead a continuous pseudorandom analog key stream signal which is transformed with the original analog signal to create an encrypted ciphertext signal which is statistically independent of the original signal and the key stream signal. The transform is then inverted with the ciphertext signal and the same key stream signal to recover the original signal. The performance and characteristics of such a system has been measured and demonstrated through modeling and simulation

    Waveforms and channel coding for 5G

    Get PDF
    Abstract. The fifth generation (5G) communication systems are required to perform significantly better than the existing fourth generation (4G) systems in data rate, capacity, coverage, latency, energy consumption and cost. Hence, 5G needs to achieve considerable enhancements in the areas of bandwidth, spectral, energy, and signaling efficiencies and cost per bit. The new radio access technology (RAT) of 5G physical layer needs to utilize an efficient waveform to meet the demands of 5G. Orthogonal frequency division multiplexing (OFDM) is considered as a baseline for up to 30 GHz. However, a major drawback of OFDM systems is their large peak to average power ratio (PAPR). Here in this thesis, a simple selective-mapping (SLM) technique using scrambling is proposed to reduce the PAPR of OFDM signals. This technique selects symbol sequences with high PAPR and scrambles them until a PAPR sequence below a specific threshold is generated. The computational complexity of the proposed scheme is considerably lower than that of the traditional SLM. Also, performance of the system is investigated through simulations and more than 4.5 dB PAPR reduction is achieved. In addition, performance of single carrier waveforms is analyzed in multiple-input multiple-output (MIMO) systems as an alternative to OFDM. Performance of a single carrier massive MIMO system is presented for both uplink and downlink with single user and multiple user cases and the effect of pre-coding on the PAPR is studied. A variety of channel configurations were investigated such as correlated channels, practical channels and the channels with errors in channel estimate. Furthermore, the candidate coding schemes are investigated for the new RAT in the 5G standard corresponding the activities in the third generation partnership project (3GPP). The schemes are evaluated in terms of block error rate (BLER), bit error rate (BER), computational complexity, and flexibility. These parameters comprise a suitable set to assess the performance of different services and applications. Turbo, low density parity check (LDPC), and polar codes are considered as the candidate schemes. These are investigated in terms of obtaining suitable rates, block lengths by proper design for a fair comparison. The simulations have been carried out in order to obtain BLER / BER performance for various code rates and block lengths, in additive white Gaussian noise (AWGN) channel. Although polar codes perform well at short block lengths, LDPC has a relatively good performance at all the block lengths and code rates. In addition, complexity of the LDPC codes is relatively low. Furthermore, BLER/BER performances of the coding schemes in Rayleigh fading channels are investigated and found that the fading channel performance follows a similar trend as the performance in the AWGN channel

    Methods of covert communication of speech signals based on a bio-inspired principle

    Get PDF
    This work presents two speech hiding methods based on a bio-inspired concept known as the ability of adaptation of speech signals. A cryptographic model uses the adaptation to transform a secret message to a non-sensitive target speech signal, and then, the scrambled speech signal is an intelligible signal. The residual intelligibility is extremely low and it is appropriate to transmit secure speech signals. On the other hand, in a steganographic model, the adapted speech signal is hidden into a host signal by using indirect substitution or direct substitution. In the first case, the scheme is known as Efficient Wavelet Masking (EWM), and in the second case, it is known as improved-EWM (iEWM). While EWM demonstrated to be highly statistical transparent, the second one, iEWM, demonstrated to be highly robust against signal manipulations. Finally, with the purpose to transmit secure speech signals in real-time operation, a hardware-based scheme is proposedEsta tesis presenta dos métodos de comunicación encubierta de señales de voz utilizando un concepto bio-inspirado, conocido como la “habilidad de adaptación de señales de voz”. El modelo de criptografía utiliza la adaptación para transformar un mensaje secreto a una señal de voz no confidencial, obteniendo una señal de voz encriptada legible. Este método es apropiado para transmitir señales de voz seguras porque en la señal encriptada no quedan rastros del mensaje secreto original. En el caso de esteganografía, la señal de voz adaptada se oculta en una señal de voz huésped, utilizando sustitución directa o indirecta. En el primer caso el esquema se denomina EWM y en el segundo caso iEWM. EWM demostró ser altamente transparente, mientras que iEWM demostró ser altamente robusto contra manipulaciones de señal. Finalmente, con el propósito de transmitir señales de voz seguras en tiempo real, se propone un esquema para dispositivos hardware

    Implementation of FPGA in the Design of Embedded Systems

    Get PDF
    The use of FPGAs (Field Programmable Gate Arrays) and configurable processors is an interesting new phenomenon in embedded development. FPGAs offer all of the features needed to implement most complex designs. Clock management is facilitated by on-chip PLL (phase-locked loop) or DLL (delay-locked loop) circuitry. Dedicated memory blocks can be configured as basic single-port RAMs, ROMs, FIFOs, or CAMs. Data processing, as embodied in the devices’ logic fabric, varies widely. The ability to link the FPGA with backplanes, high-speed buses, and memories is afforded by support for various single ended and differential I/O standards. Also found on today’s FPGAs are system-building resources such as high speed serial I/Os, arithmetic modules, embedded processors, and large amounts of memory. Here in our project we have tried to implement such powerful FPGAs in the design of possible embedded systems that can be designed, burned and deployed at the site of operation for handling of many kinds of applications. In our project we have basically dealt with two of such applications –one the prioritized traffic light controller and other a speech encrypting and decrypting system

    A secure image steganography based on burrows wheeler transform and dynamic bit embedding

    Get PDF
    In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence.  In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods

    Enhancement of speech scrambles using DNA technique and chaotic maps over transformation domain

    Get PDF
    This work presents and describes a new method for speech scrambles in light of chaotic maps and DNA coding. Both a wavelet transform (DWT) and Discrete cosine transform (DCT) are used to change the speech signal into another format for processing. The chaotic maps are represented by Logistic-Chebyshev map (LCH) and Random Logistic map (RLM) which are employed for generating sequences of keys that are used in the proposed system, hence the use of DNA encoding technology as an emerging technology for enhancing the security of speech. The proposed system is illustrated explicitly and tested with various security speech signals metrics, such as the coefficient, signal to noise ratio and peak signal to noise ratio. All tests of the proposed system concluded that the speech signal is reliably secure and undetectable, and hence the proposed system provides a sufficient security level

    Secure mobile radio communication over narrowband RF channel.

    Get PDF
    by Wong Chun Kau, Jolly.Thesis (M.Phil.)--Chinese University of Hong Kong, 1992.Includes bibliographical references (leaves 84-88).ABSTRACT --- p.1ACKNOWLEDGEMENT --- p.3Chapter 1. --- INTRODUCTION --- p.7Chapter 1.1 --- Land Mobile Radio (LMR) CommunicationsChapter 1.2 --- Paramilitary Communications SecurityChapter 1.3 --- Voice Scrambling MethodsChapter 1.4 --- Digital Voice EncryptionChapter 1.5 --- Digital Secure LMRChapter 2. --- DESIGN GOALS --- p.20Chapter 2.1 --- System Concept and ConfigurationChapter 2.2 --- Operational RequirementsChapter 2.2.1 --- Operating conditionsChapter 2.2.2 --- Intelligibility and speech qualityChapter 2.2.3 --- Field coverage and transmission delayChapter 2.2.4 --- Reliability and maintenanceChapter 2.3 --- Functional RequirementsChapter 2.3.1 --- Major system featuresChapter 2.3.2 --- Cryptographic featuresChapter 2.3.3 --- Phone patch facilityChapter 2.3.4 --- Mobile data capabilityChapter 2.4 --- Bandwidth RequirementsChapter 2.5 --- Bit Error Rate RequirementsChapter 3. --- VOICE CODERS --- p.38Chapter 3.1 --- Digital Speech Coding MethodsChapter 3.1.1 --- Waveform codingChapter 3.1.2 --- Linear predictive codingChapter 3.1.3 --- Sub-band codingChapter 3.1.4 --- VocodersChapter 3.2 --- Performance EvaluationChapter 4. --- CRYPTOGRAPHIC CONCERNS --- p.52Chapter 4.1 --- Basic Concepts and CryptoanalysisChapter 4.2 --- Digital Encryption TechniquesChapter 4.3 --- Crypto SynchronizationChapter 4.3.1 --- Auto synchronizationChapter 4.3.2 --- Initial synchronizationChapter 4.3.3 --- Continuous synchronizationChapter 4.3.4 --- Hybrid synchronizationChapter 5. --- DIGITAL MODULATION --- p.63Chapter 5.1 --- Narrowband Channel RequirementsChapter 5.2 --- Narrowband Digital FMChapter 5.3 --- Performance EvaluationChapter 6. --- SYSTEM IMPLEMENTATION --- p.71Chapter 6.1 --- Potential EMC ProblemsChapter 6.2 --- Frequency PlanningChapter 6.3 --- Key ManagementChapter 6.4 --- Potential Electromagnetic Compatibility (EMC) ProblemsChapter 7. --- CONCLUSION --- p.80LIST OF ILLUSTRATIONS --- p.81REFERENCES --- p.82APPENDICES --- p.89Chapter I. --- Path Propagation Loss(L) Vs Distance (d)Chapter II. --- Speech Quality Assessment Tests performedby Special Duties Unit (SDU
    corecore