[1]龚雪,张育钊,庄铭杰,等.数字对讲机语音加密方法及实现[J].华侨大学学报(自然科学版),2018,39(5):756-761.[doi:10.11830/ISSN.1000-5013.201611078]
 GONG Xue,ZHANG Yuzhao,ZHUANG Mingjie,et al.Method and Implemention of Voice Encryption in Digital Interphone[J].Journal of Huaqiao University(Natural Science),2018,39(5):756-761.[doi:10.11830/ISSN.1000-5013.201611078]
点击复制

数字对讲机语音加密方法及实现()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第39卷
期数:
2018年第5期
页码:
756-761
栏目:
出版日期:
2018-09-20

文章信息/Info

Title:
Method and Implemention of Voice Encryption in Digital Interphone
文章编号:
1000-5013(2018)05-0756-06
作者:
龚雪1 张育钊1 庄铭杰1 唐加能123
1. 华侨大学 工学院, 福建 泉州 362021;2. 华侨大学 机电及自动化学院, 福建 厦门 361021;3. 福建先创电子有限公司, 福建 泉州 362000
Author(s):
GONG Xue1 ZHANG Yuzhao1ZHUANG Mingjie1 TANG Jianeng123
1. College of Engineering, Huaqiao University, Quanzhou 362021, China; 2. College of Mechanical Engineering and Automation, Huaqiao University, Xiamen 361021, China; 3. Centron Communications Technologies Fujian Limited Liability Company, Quanzhou 362000, China
关键词:
数字对讲机 语音加密 混沌系统 STM 32平台
Keywords:
digital interphone voice encryption chaotic system STM 32 platform
分类号:
TP391
DOI:
10.11830/ISSN.1000-5013.201611078
文献标志码:
A
摘要:
提出一种数字对讲机实时语音加密方案.首先,利用线性同余发生器和复合混沌系统设计加密系统.利用Chebyshev映射和Cubic映射构造动态变参数复合混沌系统,并用线性同余发生器为复合混沌系统提供初值.然后,基于STM 32硬件平台设计数字对讲机语音加密系统,加密算法中所有步骤都在STM 32平台上实现.经测试表明:该加密系统具有较高的安全性和较好的实时性.
Abstract:
A digital interphone voice encryption scheme is proposed. Firstly, we designed a cryptosystem based on linear congruential generator and a hybrid chaotic system. The hybrid chaotic system with variable parameter is constructed based on Chebyshev map and Cubic map. And we ulitize linear congruential generator to provide the initial value for hybrid chaotic system. Then, a digital interphone voice cryptosystem is realized in STM 32 hardware platform. And all the steps described in the algorithm is implemented in STM 32. Finally, the experimental results show that the cryptosystem has higher security and better real-time performance.

参考文献/References:

[1] ALANAZI H O,ZAIDAN B B,ZAIDAN A A,et al.New comparative study between DES, 3DES and AES within nine factors[J].Computer Science,2010,3(2):152-157.
[2] ANEES A,SIDDIQUI A M,AHMED F.Chaotic substitution for highly autocorrelated data in encryption algorithm[J].Communications in Nonlinear Science and Numerical Simulation,2014,19(9):3106-3118.DOI:10.1016/j.cnsns.2014.02.011.
[3] BARENGHI A,BERTONI G M,BREVEGLIERI L,et al.A fault induction technique based on voltage underfeeding with application to attacks against AES and RSA[J].Journal of Systems and Software,2013,86(7):1864-1878.DOI:10.1016/j.jss.2013.02.021.
[4] HU Hanping,LIU Lingfeng,DING Naida.Pseudorandom sequence generator based on the Chen chaotic system[J].Computer Physics Communications,2013,184(3):765-768.DOI:10.1016/j.cpc.2012.11.017.
[5] AHMAD M,ALAM B,FAROOQ O.Chaos based mixed keystream generation for voice data encryption[J].International Journal on Cryptography and Information Security,2012,2(1):39-48.
[6] AZZAZ M S,TANOUGAST C,SADOUDI S,et al.Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(8):2035-2047.DOI:10.1016/j.cnsns.2012.12.018.
[7] LEHMER D H.Mathematical methods in large-scale computing units[C]//Proceedings of a Second Symposium on Large-Scale Digital Calculating Machinery.Cambridge:Harvard University Press,1951:141-146.
[8] VAJARGAH B F,ASGHARI R.A pseudo random number generator based on chaotic henon map(CHCG)[J].IJMEC,2015,5(15):2120-2129.DOI:649123/10134.
[9] RUKHIN A,SOTO J,NECHVATAL J,et al.A statistical test suite for random and pseudorandom number generators for cryptographic applications[J].Applied Physics Letters,2015,22(7):1645-1679.DOI:10.1063/1.4928732.
[10] 张伟伟.通信系统中语音质量评价的研究[D].北京:北京邮电大学,2014.

备注/Memo

备注/Memo:
收稿日期: 2016-11-22
通信作者: 张育钊(1963-),男,副教授,博士,主要从事无线通信的研究.E-mail:zyz@hqu.edu.cn.
基金项目: 国家自然科学基金资助项目(61573004); 福建省教育厅项目(JA15035); 福建省泉州市科技项目(2014Z103, 2015Z114)
更新日期/Last Update: 2018-09-20