Author:
Mokhnache S.,Daachi M. E. H.,Bekkouche T.,Diffellah N.
Abstract
This paper presents a speech encryption scheme by performing a combination of modified chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the performance of classical chaotic maps by extending the range of the chaotic parameter. The resulted combining map was applied to a speech encryption scheme by using the confusion and diffusion architecture. The evaluation results showed a good performance regarding the chaotic behaviors such as initial value, control parameter, Lyapunov exponent, and bifurcation diagram. Simulations and computer evaluations with security analysis showed that the proposed chaotic system exhibits excellent performance in speech encryption against various attacks. The results obtained demonstrated the efficiency of the proposed scheme compared to an existing valuable method for static and differential cryptographic attacks.
Publisher
Engineering, Technology & Applied Science Research
Reference19 articles.
1. S. NajimAlSaad and E. Hato, "A Speech Encryption based on Chaotic Maps," International Journal of Computer Applications, vol. 93, no. 4, pp. 19–28, May 2014.
2. M. O. Al-Dwairi, A. Y. Hendi, and Z. A. AlQadi, "An Efficient and Highly Secure Technique to Encrypt and Decrypt Color Images," Engineering, Technology & Applied Science Research, vol. 9, no. 3, pp. 4165–4168, Jun. 2019.
3. R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019.
4. H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, "New Comparative Study Between DES, 3DES and AES within Nine Factors," Journal of Computing, vol. 2, no. 3, pp. 152–157, Mar. 2010.
5. P. Patil, P. Narayankar, Narayan D.G., and Meena S.M., "A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, vol. 78, pp. 617–624, Jan. 2016.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献