Speech encryption applying a modified Blowfish algorithm

Author(s):  
Amaal A. Abd El-Sadek ◽  
Talaat A. El-Garf ◽  
Mohammed M. Fouad
Keyword(s):  
2017 ◽  
Vol 20 (4) ◽  
pp. 977-1004 ◽  
Author(s):  
Naglaa F. Soliman ◽  
Zhraa Mostfa ◽  
Fathi E. Abd El-Samie ◽  
Mahmoud I. Abdalla

Author(s):  
Mohammed F. Tolba ◽  
Wafaa S. Sayed ◽  
Ahmed G. Radwan ◽  
Salwa K. Abd-El-Hafiz ◽  
Ahmed M. Soliman
Keyword(s):  

Author(s):  
Heba M. Yassin ◽  
Ahmed T. Mohamed ◽  
Ahmed H. Abdel-Gawad ◽  
Mohammed F. Tolba ◽  
Hassan I. Saleh ◽  
...  
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
F. J. Farsana ◽  
K. Gopakumar

With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. In this contest there is an increasing demand for successful storage of the data in the encrypted domain to avoid the possibility of data breach in shared networks. In this paper, a novel approach for speech encryption algorithm based on quantum chaotic system is designed. In the proposed method, classical bits of the speech samples are initially encoded in nonorthogonal quantum state by the secret polarizing angle. In the quantum domain, encoded speech samples are subjected to bit-flip operation according to the Controlled–NOT gate followed by Hadamard transform. Complete superposition of the quantum state in both Hadamard and standard basis is achieved through Hadamard transform. Control bits for C-NOT gate as well as Hadamard gate are generated with a modified Lu˙-hyperchaotic system. Secret nonorthogonal rotation angles and initial conditions of the hyperchaotic system are the keys used to ensure the security of the proposed algorithm. The computational complexity of the proposed algorithm has been analysed both in quantum domain and classical domain. Numerical simulation carried out based on the above principle showed that the proposed speech encryption algorithm has wider keyspace, higher key sensitivity and robust against various differential and statistical cryptographic attacks.


Sign in / Sign up

Export Citation Format

Share Document