EUROCRYPT 1982: Cryptography pp 130-146 | Cite as

Analogue Speech Security Systems

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 149)


Speech is probably the most fundamental form of communication available to us and our society has become highly dependent on our modern, fast and accurate means of transmitting spoken messages. Usually the main aim of communicants is merely to trasmit a message as quickly, accurately and cheaply as possible. There are, however, a number of situations where the information is confidential and where an interceptor might be able to benefit immensely fromt he knowledge gained by monitoring the information circuit. In such situations the communicants must take steps to conceal and protect the content of their spoken message. Of course, the amount of protection will vary. On occasions it is sufficient to prevent a casual ‘listener’ from understanding the message but there are other times when it is crucial that even a determined interceptor must not be able to deduce ti.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7. References

  1. [1]
    Beker, H.J and Mitchell, C.J. ‘Permutations with restricted displacement’, to be submitted.Google Scholar
  2. [2]
    Beker, H. J. and Piper, F.C. ‘Cipher Systems: The protection of communications’, Northwood Books (1982).Google Scholar
  3. [3]
    Bromfield, A.J. and Mitchell, C.J. ‘Permutation selector for a sliding window time element scrambler’, to be submitted.Google Scholar
  4. [4]
    MacKinnon, N.R.F., ‘The development of speech encipherment’, Radio and Elect. Eng. Vol 50, No 64, 1980, 147–155.Google Scholar
  5. [5]
    Telsy Systems, ‘Secure Voice: Reality or myth’ (1979)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1983

Authors and Affiliations

  1. 1.Milford Industrial EstateRacal-Comsec LimitedSalisbury

Personalised recommendations