Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem

Authors

  • Artan LUMA
  • Besnik SELİMİ
  • Lirim AMETİ

DOI:

https://doi.org/10.18100/ijamec.68742

Keywords:

privacy, cryptography, elliptic curves, voice message

Abstract

Securing a communication is always a challenge for participants in it. A lot of applications available in the market claim to enable secure audio communication, but not always show the details of the technology used behind to encrypt the data. It is important for end users to understand the techniques used for encrypting the data, in order to trust it. Elliptic curve cryptography, an approach to public key cryptography, is now widely used in cryptographic systems. Hence, in this paper we propose using elliptic curve cryptography to secure the transmission of voice messages through the network. The system that is proposed and implemented enables the encryption of the voice message, its transmission through the network and its decryption at the other end.

Downloads

Download data is not yet available.

References

Shoewu, O. and S.O. Olatinwo. 2013. “Securing Text Messages using Elliptic Curve Cryptography Orthogonal Frequency Division Multiplexing”.

Nils Gura, Arun Patel, Arvinderpal Wander, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, 2004.

Fuwen Liu, A Tutorial on Elliptic Curve Cryptography (ECC), https://www-rnks.informatik.tu-cottbus.de/content/unrestricted/staff/lfw/A%20tutorial%20of%20elliptic%20curve%20cryptography.pdf [15.12.2013].

Christof Paar and Jan Pelzi, Understanding Cryptography, http://wiki.crypto.rub.de/Buch/download/Understanding_Cryptography_Chptr_9---ECC.pdf [15.12.2013].

Design of Secure Computer Systems CSI4138/CEG4394, Dr Jean-Yves Chouinard, 2002.

WAVE PCM soundfile format. https://ccrma.stanford.edu/courses/422/projects/WaveFormat/ [15.12.2013].

Socket Class, http://msdn.microsoft.com/en-us/library/system.net.sockets.socket(v=vs.110).aspx [15.12.2013].

Downloads

Published

03-11-2014

Issue

Section

Research Articles

How to Cite

[1]
“Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem”, J. Appl. Methods Electron. Comput., vol. 2, no. 4, pp. 54–58, Nov. 2014, doi: 10.18100/ijamec.68742.