Skip to main content

Using Elliptic Curve Encryption and Decryption for Securing Audio Messages

  • Conference paper


The security of message transmission is usually a challenge for its participants. Many available programs that work with audio data claim to enable secured communication, but usually do not show the details of the methods used for data encryption. For end users to be confident, it is essential to be aware of the methods and techniques used for data encryption and decryption. Elliptic curve cryptography, an approach to public key cryptography, is now commonly used in cryptosystems. Hence, in this paper we present a method for using elliptic curve cryptography in order to secure audio data communications. Furthermore, we present a tool that implements this method for encrypting an audio file, transmitting it through the network and decrypting the file at the other end.


  • Audio message
  • Cryptography
  • Decryption
  • Elliptic curves
  • Encryption
  • Privacy
  • Secure transmission

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-94-017-9804-4_42
  • Chapter length: 15 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   219.00
Price excludes VAT (USA)
  • ISBN: 978-94-017-9804-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   279.99
Price excludes VAT (USA)
Hardcover Book
USD   349.99
Price excludes VAT (USA)
Fig. 42.1
Fig. 42.2
Fig. 42.3
Fig. 42.4
Fig. 42.5
Fig. 42.6
Fig. 42.7


  1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22 6, 644–654 (1976)

    CrossRef  MathSciNet  Google Scholar 

  2. Rivest,R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Google Scholar 

  3. Shoewu, O., Olatinwo, S.O.: Securing text messages using elliptic curve cryptography and orthogonal frequency division multiplexing. Pac. J. Sci. Technol. 14, 220–227 (2013)

    Google Scholar 

  4. Luma, A., Ameti, L.: ECC secured voice transmitter. Lecture notes in engineering and computer science: Proceedings of The World Congress on Engineering 2014, WCE 2014, London, pp. 488–491. 2–4 July 2014

    Google Scholar 

  5. Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. In: Towards a Quarter-Century of Public Key Cryptography, pp. 103–123. Springer (2000)

    Google Scholar 

  6. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, August 2004

    Google Scholar 

  7. Blake, I., Seroussi, G., Smart, N.: Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, vol. 317, Cambridge University Press, Cambridge (2005)

    Google Scholar 

  8. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptograph. Springer-Verlag, New York (2004). ISBN 0-387-95273-X

    Google Scholar 

  9. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology – CRYPTO 2001, pp. 213–229. Springer, Berlin/Heidelberg (2001)

    Google Scholar 

  10. Stallings, W.: Cryptography and network security (4th Edition). Prentice-Hall, Inc., Upper Saddle River, New Jersey (2005)

    Google Scholar 

  11. Microsoft Corporation: WAVE and AVI Codec registries – RFC 2361. IETF. (1998). Retrieved 15 Dec 2013

  12. Library of Congress: (2008-09-12). WAVE. Waveform audio file format. (2008). Retrieved 15 Dec 2013

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Artan Luma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Luma, A., Selimi, B., Ameti, L. (2015). Using Elliptic Curve Encryption and Decryption for Securing Audio Messages. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht.

Download citation

  • DOI:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9803-7

  • Online ISBN: 978-94-017-9804-4

  • eBook Packages: EngineeringEngineering (R0)