FPGA Based Design of Speech Encryption and Decryption for Secure Communication
Data in any form, such as speech, image, video, text etc. need to be transferred against various threats. Such information need to be modified in such a form that even if someone gets an access to it, he will not be able to understand it i.e. it needs to
- PDF / 4,080,259 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 46 Downloads / 217 Views
, Mayank Jain
, Manish
, and Kriti Suneja
Department of Electronics and Communication, Delhi Technological University, Delhi 110042, India [email protected], [email protected], [email protected], [email protected]
Abstract. Data in any form, such as speech, image, video, text etc. need to be transferred against various threats. Such information need to be modified in such a form that even if someone gets an access to it, he will not be able to understand it i.e. it needs to be encrypted before transmission and must be decrypted at receiver side in order to ensure data security. Breaching of sensitive data by fraudsters may impose a potential cost in terms of money, time and efforts. Many approaches have been taken in this direction to attain such security among which chaos based encryption is relatively newer one. Chaotic systems are highly secure and reliable system for encryption. The chaotic systems are highly sensitive to initial conditions and their values dramatically change with the change in initial conditions. This work intends to improve the existing cryptology methods utilizing chaotic circuits. Also, a standalone hardware design which can be used as a part of portable chips for online encryption and decryption is the main objective of this work. In this paper, we have proposed an FPGA based chaotic system with modified logistic encryption algorithm in order to reduce processing time in comparison to that of software. The synthesis results clearly show that the hardware implementation of logistic encryption outperforms the software based implementation and thus can be used in portable devices as a chip. Keywords: FPGA Speech Chaotic Hardware Encryption Decryption Hamming code Software Communication Logistic mapping Sampling
1 Introduction In this era, when data is everywhere, including mobiles, computer, servers etc. and the need to transfer this massive amount of data from one device to another requires information security. This data may include sensitive information which is prone to hacking threats, for e.g. military data, bank data, personal details. While transferring such data, one of the major problems is security. To meet the ever-increasing demand of secure system for communication, data storage, transfer of data, etc. lots of methodologies have been developed one of such method is chaotic system. There are various factors or features which lead to the advancement in the methods and approach to chaotic system. These systems provide a high degree of randomness based on initial values. Chaotic systems are © Springer Nature Singapore Pte Ltd. 2020 C. Badica et al. (Eds.): ICICCT 2020, CCIS 1170, pp. 37–49, 2020. https://doi.org/10.1007/978-981-15-9671-1_3
38
R. Saini et al.
generally non-linear and dynamic in nature. Their dependence on initial states lead to the formation of eye- catching butterfly diagrams, which confirm their randomness. Its randomness finds application in many fields including communication system [1, 2], cryptography and encryption [
Data Loading...