0% found this document useful (0 votes)
8 views17 pages

CyberSecurity Review 1

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 17

Enhanced Secure Audio and

Voice Message Transmission


via Hybrid Algorithm

- Harshit Jaiswal(20BCE2157)
- Sahas Vivek(20BCE2701)
- Harsh Detroja( 20BCE2814)
Abstract
The security оf thе RSA cryptosystem is based оn twо mаthеmаtiсаl
рrоblеms: thе рrоblеm оf factoring large numbers ,mаthеmаtiсаl аttасk аnd
thе рrоblеm оf trуing аll роssiblе рrivаtе keys knоw brutе fоrсе attack. The
Modified RSA Encryption Algorithm (MREA) to enhance RSA security. MREA
employs additive homomorphic properties, ensuring security through
factoring and compositional residuosity assumptions. This additive
homomorphic cryptosystem allows computing the encryption of m1 + m2
with only public-key and encryptions of m1 and m2. A comparison between
RSA and MREA in security and performance is presented. Given the rising
importance of secure speech communication and the risk of data breaches
from voice assistants, a proposed system converts speech commands to text,
encrypted with Modified RSA + AES. Google Speech API and encrypted
Socket connections facilitate secure data transmission for assistant training.
Paper 1: AES Algorithm for real-time Audio
Steganography

Authors: Tang, S.Y. , Y.J. Jiang, L.P. Zhang, and Z.B. Zhou. (Scopus - 2018)

Methodology: This system uses a VoIP steganographic technique using AES and key distribution
to achieve real-time covert VoIP communication. The encryption and embedding procedures are
nearly identical. In terms of statistical analysis, the suggested VoIP steganographic technique was
found to be secure, effective, and robust after performance testing with state-of-the art network
equipment DSLA and security tests utilizing the M-W-W approach
Advantages:
- Different values of Audio Frequency and Time Domains are supported.
- It is based on Real-time services.
- The quality of encrypted speech is not destroyed.
- Highly redundant representations generally allow the inclusion of a significant amount of hidden
data with easy and subtle modifications that preserve the underlying cover object's perceptual
content.
Drawbacks:
- It requires large amount of data to train the model.
- The real-time requirements of VoIP communication provide basic security for the system, but
they limit the number of operations that can be performed, making it difficult to add more
operations (for instance, security measures) to improve security.
Paper 2: Implementation of Public Key Encryption
Algorithm for Speech Data Encryption and Decryption

Authors: Md. Mijanur Rahman, Tushar Kanti Saha, Md. Al-Amin Bhuiyan (IJCSNS)

Methodology: The paper explores the implementation of various Public Key Encryption
Algorithms to secure different forms of voice or speech data. Multiple encryption techniques are
employed to safeguard the diverse types of voice data. The study focuses on encrypting the voice
content using different algorithms, ensuring robust protection for various forms of spoken
information. By applying a range of encryption methods, the research aims to enhance the
security of voice data in scenarios requiring confidentiality and privacy.
Advantages:

- There is no guarantee who sent a given message in the Standard encryption methods, thus Public
key encryption has rapidly grown in popularity.

- It offers a very secure encryption method that addresses several concerns

Drawbacks:

- The integer representation of the message to be encrypted should lie within the range specified
by the modulus (i.e., M lies in the range [0, n1]), which poses a limitation on the maximum number of
characters that can be encrypted at a single time
Paper 3: Encryption and Decryption of Audio Signal
based on RSA Algorithm

Authors: Sura F. Yousif.

Methodology: This paper specifically applies the RSA algorithm to encrypt audio signals,
ensuring their confidentiality. Various types of voice and speech data are utilized in the study to
showcase the algorithm's effectiveness in securing diverse content. The research focuses on
implementing RSA encryption for voice data, addressing the challenge of protecting sensitive
auditory information. By using RSA on audio signals, the study aims to provide a comprehensive
approach to safeguarding voice data, promoting security in scenarios where privacy is paramount.
Advantages:

- The presented technique use validated that it is secure, reliable and efficient to be applied in
secure audio communications.

- It performed high intelligibility of the recovered audio signal.

Drawbacks:

- Compared to symmetric ciphers, the RSA algorithm requires more computations due to its
asymmetric nature, involving both public and private keys. This increased computational load is
attributed to tasks such as key generation, encryption, and decryption, which involve complex
mathematical operations, potentially impacting processing efficiency.
Paper 4: Ameliorated ElGamal Public Key Encryption
Over Finite Field

Authors: Khoirom, Motilal Singh, Dolendro Singh Laiphrakpam, and Themrichon Tuithung

Methodology: They achieved reasonable execution speed for a public key encryption technique.
The proposed approach is a strong, trustworthy public key audio encryption strategy thanks to
the analysis results, the strength of ECDLP, and the enhancements achieved with ElGamal PKE.
Advantages:
- With the encryption process cipher audio is generated after various analysis and comparisons to
demonstrate the discriminative capability of their method.
- It gives a solution to the data expansion problem as well as additional computations for
embedding integerrepresented messages in specified coordinates that satisfy the elliptic curve.

Drawbacks:
- The audio data is stored as coordinates which leads to data expansion.
- Elliptic curves have large modulo prime value, so for every small integer representation of a
message, the expansion in cipher text is massive.
- The simulation uses 512 bits Elliptic curve parameter, so it becomes computationally very
intensive to do it using Brute Force technique.
Paper 5: Modified RSA-based algorithm: a double
secure approach

Authors: Israa Al_Barazanchi, Shihab A. Shawkat, Moayed H. Hameed, Khalid Saeed Lateef
Al-badri

Methodology: This paper examines the general principles of encryption and focuses on the
development of RSA and the complexity of the encryption key so that it becomes more secure in
the applications used. In this project, we will work on the RSA algorithm by adding some
complexity to the 3 keys (3k). This addition will increase the security and complexity of the
algorithm's speed while maintaining encryption and decryption time. The paper also presents an
approach by means of public-key encryption to enhance cryptographic security.
Advantages:
- This work recommended a multilevel system for decryption and encryption for the provision of
more security to storage information
- The comparison of a traditional RSA and three keys RSA showed the relatively high security and
alterations in equation formation for the 3k RSA algorithm
- The comparison of a traditional RSA and three keys RSA showed the relatively high security and
alterations in equation formation for the 3k RSA algorithm

Drawbacks:
- But that person won’t be able to recover secret text while lacking private key accessibility. The
creation of the longer keys would provide security for some years such as factoring them is not
feasible.
Paper 6: Audio Encryption Optimization

Authors: Harsh Bijlani, Dikshant Gupta, Mayank Lovanshi

Methodology: Through this paper, it is proposed that the model based on a comparison of
different sizes of audio files by taking into account of decimation factor through which the sample
rate changes and obtained a time taken to encrypt such generated audio files and thus provide an
analysis on AES and DES algorithm for the audio file encryption and suggesting which have better
performance based on our results obtained.
Advantages:

- The entire Encryption and Decryption process is optimized. The time taken compared to the
traditional method is less.

- The Space taken has reduced substantially. The security standards have increased.

Drawbacks:

- The net computation power requirement has increased, thus better hardware is needed to run
the application.
Paper 7: Encryption Technology of Voice Transmission
in Mobile Networks Using 3DES -ECC

Authors: Zhixian Chang, Marcin Wozniak

Methodology: The paper delves into the utilization of the Triple Data Encryption Standard
(3DES) and elliptic curve cryptography (ECC) methodologies. It examines how the 3DES algorithm
enhances security through the application of three sequential DES operations. Additionally, the
paper explores the efficiency and robustness of ECC in comparison to traditional encryption
techniques. By evaluating both 3DES and ECC, the study aims to provide insights into their
respective strengths and weaknesses, contributing to a comprehensive understanding of modern
cryptographic approaches for data protection.
Advantages:

- This method can effectively encrypt the voice transmission process. For many experiments, the
encryption time is less than 1 s,

- The encryption speed is fast, and the encryption effect is good.

Drawbacks:

- There is high data loss compare to other algorithms.


Issues in existing systems

● When Audio messages are not encrypted, they are susceptible to hackers and third
party. Man-in-the-Middle attacks are very common and easy to implement. Thus any
third party can access your voice recordings and audio.

● The existing audio encryption protocols are slow and space intensive. They need a
considerate amount of data to be processed and encrypted. The entire process is time
intensive.

● Security is another issue. The standard protocols are not secure enough to be
implemented on large scale applications without affecting the performance. We need
an algorithm with stronger encryption protocols.

● For Some Algorithms The audio data is stored as coordinates which leads to data
expansion.

You might also like