Open Access iconOpen Access

ARTICLE

crossmark

Secret Key Optimization for Secure Speech Communications

Osama S. Faragallah1,*, Mahmoud Farouk2, Hala S. El-Sayed3

1 Department of Information Technology, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
2 Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
3 Department of Electrical Engineering, Faculty of Engineering, Menoufia University, Shebin El-Kom 32511, Egypt

* Corresponding Author: Osama S. Faragallah. Email: email

Computers, Materials & Continua 2022, 72(2), 3025-3037. https://doi.org/10.32604/cmc.2022.019951

Abstract

This paper answers three essential questions for audio speech cryptosystems in time and discrete transform domains. The first question is, what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform domains. The second question is the relation between the number of sub-keys, the number of secret keys used, and the audio speech signal block’s size. Finally, how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform domains. An audio cryptosystem discussed before in recent research is applied to answer the three previous inquiries. Accurate simulation results and analysis answer all three questions; first, there is no specific, well-defined format or rule for sub-key values that must be used to get a better cryptosystem. For the second question, yes, there is a direct relationship between the number of applicable keys, number of available sub-keys, and block size of speech audio signal and formulated into a first-order equation. For the third question, each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.

Keywords


Cite This Article

O. S. Faragallah, M. Farouk and H. S. El-Sayed, "Secret key optimization for secure speech communications," Computers, Materials & Continua, vol. 72, no.2, pp. 3025–3037, 2022.



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 967

    View

  • 507

    Download

  • 0

    Like

Related articles

Share Link