Advertisement

The Automated Cryptanalysis of Analog Speech Scramblers

  • B Goldburg
  • E Dawson
  • S Sridharan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)

Abstract

An automated method of attacking commonly used speech scramblers is presented. The cryptanalysis relies on the availability of the scrambled speech only and makes use of the characteristics of speech. It is shown that some of the currently available time and frequency domain scramblers, based on a fixed permutation, can be cryptanalysed. For systems where the permutation is changed with time, methods for partial recovery of the encrypted speech for several existing systems are given. In the case of the frequency domain scramblers a novel method of attack using a codebook is presented.

Keywords

Intelligible Speech Attack Process Speech Frame Spectral Distance Codebook Vector 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    H. Beker, and F. Piper, Secure Speech Communications, Academic Press, 1985.Google Scholar
  2. 2.
    J.M. Carroll, and S. Martin, “The Automated Cryptanalysis of Substitution Ciphers”, Cryptologia, Vol. 10, 1986, pp 193–209.CrossRefGoogle Scholar
  3. 3.
    J.M. Carroll, and L.E. Robbins, “The Automated Cryptanalysis of Polyalphabetic Ciphers”, Cryptologia, Vol. 11, 1987, pp 193–205.CrossRefMathSciNetGoogle Scholar
  4. 4.
    J.M. Carroll, and L.E. Robbins, Computer Cryptanalysis, Technical Report No. 223, Dept. of Computer Science, The University of Western Ontario, Dec. 1988.Google Scholar
  5. 5.
    R.M. Gray, “Vector quantization”, IEEE ASSP Mag., April 1984, pp 4–29.Google Scholar
  6. 6.
    N. Kitawaki, H. Nagabuch and Itok, “Objective quality evaluation for low bit rate speech coding systems”, IEEE Journal on Selected Areas in Communication, Vol. 6, No. 2, February 1988, pp 282–248.Google Scholar
  7. 7.
    R.W. Llewellyn, Linear Programming, Hold, Rinehart and Windston, 1964.Google Scholar
  8. 8.
    A. Matsunaga, K. Koga, and M. Ohkawa, “An analog speech scrambling system using the FFT technique with high level security” IEEE Journal in Selected Areas in Communications, Vol. 7, May 1989, pp. 540–547.CrossRefGoogle Scholar
  9. 9.
    S.R. Quackenbush, T.P. Barnwell, and M.A. Clements, Objective Measures of Speech Quality, Prentice Hall, 1988.Google Scholar
  10. 10.
    S. Sridharan, E. Dawson, B. Goldburg, “A Fast Fourier Transform Based Speech Encryption System”, to appear in IEE Proceedings Part I Communications, Speech and Vision.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • B Goldburg
    • 2
  • E Dawson
    • 1
  • S Sridharan
    • 2
  1. 1.School of Mathematics and Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia
  2. 2.School of Electrical and Electronic Systems EngineeringQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations