Abstract
The security of message transmission is usually a challenge for its participants. Many available programs that work with audio data claim to enable secured communication, but usually do not show the details of the methods used for data encryption. For end users to be confident, it is essential to be aware of the methods and techniques used for data encryption and decryption. Elliptic curve cryptography, an approach to public key cryptography, is now commonly used in cryptosystems. Hence, in this paper we present a method for using elliptic curve cryptography in order to secure audio data communications. Furthermore, we present a tool that implements this method for encrypting an audio file, transmitting it through the network and decrypting the file at the other end.
Keywords
- Audio message
- Cryptography
- Decryption
- Elliptic curves
- Encryption
- Privacy
- Secure transmission
This is a preview of subscription content, access via your institution.
Buying options







References
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22 6, 644–654 (1976)
Rivest,R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Shoewu, O., Olatinwo, S.O.: Securing text messages using elliptic curve cryptography and orthogonal frequency division multiplexing. Pac. J. Sci. Technol. 14, 220–227 (2013)
Luma, A., Ameti, L.: ECC secured voice transmitter. Lecture notes in engineering and computer science: Proceedings of The World Congress on Engineering 2014, WCE 2014, London, pp. 488–491. 2–4 July 2014
Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. In: Towards a Quarter-Century of Public Key Cryptography, pp. 103–123. Springer (2000)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, August 2004
Blake, I., Seroussi, G., Smart, N.: Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, vol. 317, Cambridge University Press, Cambridge (2005)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptograph. Springer-Verlag, New York (2004). ISBN 0-387-95273-X
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology – CRYPTO 2001, pp. 213–229. Springer, Berlin/Heidelberg (2001)
Stallings, W.: Cryptography and network security (4th Edition). Prentice-Hall, Inc., Upper Saddle River, New Jersey (2005)
Microsoft Corporation: WAVE and AVI Codec registries – RFC 2361. IETF. http://tools.ietf.org/html/rfc2361 (1998). Retrieved 15 Dec 2013
Library of Congress: (2008-09-12). WAVE. Waveform audio file format. http://www.digitalpreservation.gov/formats/fdd/fdd000001.shtml (2008). Retrieved 15 Dec 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Luma, A., Selimi, B., Ameti, L. (2015). Using Elliptic Curve Encryption and Decryption for Securing Audio Messages. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9804-4_42
Download citation
DOI: https://doi.org/10.1007/978-94-017-9804-4_42
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9803-7
Online ISBN: 978-94-017-9804-4
eBook Packages: EngineeringEngineering (R0)