Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors

Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus

2016

Abstract

A large part of the latest research in speech coding and speech encryption algorithms is motivated by the need of obtaining secure military communications, to allow effective operation in a hostile environment. Since the bandwidth of the communication channel is a sensitive problem in military applications, low bitrate speech compression methods and high throughput encryption algorithms are mostly used. Several speech encryption methods are characterized by very strict requirements in power consumption, size, and voltage supply. These requirements are difficult to fulfill, given the complexity and number of functions to be implemented, together with the real time requirement and large dynamic range of the input signals. To meet these constraints, careful optimization should be done at all levels, ranging from algorithmic level, through system and circuit architecture, to layout and design of the cell library. The key points of this optimization are among others, the choice of the algorithms, the modification of the algorithms to reduce computational complexity, the choice of a fixed-point arithmetic unit, the minimization of the number of bits required at every node of the algorithm, and a careful match between algorithms and architecture. This paper describes the performance analysis on Digital Signal Processor (DSP) platform of some of the recently proposed voice encryption algorithms, as well as the performance of stream ciphers such as Grain v1, Trivium and Mickey 2.0 (which are suited for real time voice encryption). The algorithms were ported onto a fixed point DSP, Blackfin 537, and stage by stage optimization was performed to meet the real time requirements. Memory optimization techniques such as data placement and caching were also used to reduce the processing time. The goal was to determine which of the evaluated encryption algorithms is best suited for real time secure communications.

References

  1. Tremain, T. E., 1982. The Government Standard Linear Predictive Coding LPC-10. In: Speech Technology, pp.40-49.
  2. McCree, A., Kwan, T., George, E. B.,Viswanathan, V., 1996.A 2.4 kbit's MELP coder candidate for the new U.S. Federal Standard. In: Acoustics, Speech, and Signal Processing, IEEE International Conference, vol.1, pp. 200-203.
  3. Supplee, L. M., Cohn, R. P., Collura, J. S.,McCree, A., 1997. MELP: the new Federal Standard at 2400bps. In: Acoustics, Speech, and Signal Processing, IEEE International Conference, vol.2, pp. 1591-1594.
  4. Canniere, C., Preneel, B., 2006.Trivium Specifications. In: eSTREAM, ECRYPT Stream Cipher Project.
  5. Babbage, S., Dodd, M., 2006. The stream cipher MICKEY 2.0. In eSTREAM, ECRYPT Stream Cipher Project.
  6. Hell, M., Johansson, T., Meier, W., 2007. Grain- A Stream Cipherfor Constrained Environments. In: International Journal of Wireless and Mobile Computing, vol. 2, pp. 86-93.
  7. Ravikrindi, R., Nalluri, S., 2015. Digital Signal Processing, Speech encryption and decryption, availableat https://www.scribd.com/doc/23336087/ 11-speech-encryption-and-decryption (Accessed: July 2015).
  8. Babu, A. A., Yellasiri, R., 2012.Symmetric Encryption Algorithm in Speech Coding for Defence Communications. In: Journal of Computer Science & Information technology, vol. 4, pp. 369-376.
  9. Ulkareem, M., Abduljaleel, I. Q., 2013.Speech Encryption Using Chaotic Map and Blowfish Algorithms. In: Journal of Basrah Researches, vol. 39, no. 2, pp. 68- 76.
  10. ADSP-BF537 Blackfin Processor Hardware Reference manual, Revision 3.4 (2013).
  11. Wollinger, T. J., Wang, M., Guajardo, J., Paar, C., 2000. How Well Are High-End DSPs Suited for the AES Algorithms? In: Proceedings of the Third Advanced Encryption Standard Candidate Conference, pp. 94- 105.
  12. Good, T., Benaissa, M., 2008.Hardware performance of eStream phase-III stream cipher candidates. In: State of the Art of Stream Ciphers (SASC), pp. 163-173.
  13. Servetti, A., De Martin, J.C., 2002.Perception-based partial encryption of compressed speech. In: IEEE Transactions on Speech and Audio Processing, vol.10, pp. 637 - 643.
  14. ITU-t recommendation g.729, 1996, coding of speech at 8 kbit/s using conjugate-structure algebraic-codeexcitedlinear-prediction (cs-acelp).
  15. Chen, N., Zhu, J., 2007.Robust speech watermarking algorithm. In: Electronics Letters, vol. 3, pp. 1393- 1395.
  16. Girin, L., Firouzmand, M., Marchand, S., 2007.Perceptual Long-Term Variable-Rate Sinusoidal Modeling of Speech?. In: IEEE Transactions on Audio, Speech, and Language Processing, vol.15, pp. 851 - 861.
  17. Tingting, X., Zhen, Y., 2009.Simple and effective speech steganography in G.723.1 low-rate codes. In: International Conference on Wireless Communications & Signal Processing, pp. 1 - 4.
  18. Merit, K., Ouamri, A., 2012.Securing Seech in GSM Networks using DES with Random Permutation and Inversion Algorithms. In:International Journal of Distributed and Parallel Systems (IJDPS), vol.3, no.4, pp.157-164.
  19. Kaur, H., Sekhon,G. S., 2012.A Four Level Speech Signal Encryption Algorithm. In: International Journal of Computer Science and Communication (IJCSC), vol. 3, no. 1, pp. 151-153.
  20. Knezevi, M., Batina, L., Mulder, E., Fan, J., Gierlichs, B., Lee, Y. K., Maes, R., Verbauwhede I., 2013.Signal Processing for Cryptography and Security Applications.In Handbook of Signal Processing Systems, pp. 223-241.
  21. Olausson, M.,Dake, L., 2003.The ADSP-21535 Blackfin and Speech Coding.InProceedings of the Swedish System-on-chip Conference 2003.
  22. Blackfin DSP Instruction Set Reference, 2002.
  23. ADSP-21535 Blackfin DSP Hardware Reference, 2002.
  24. ITU-t recommendation on g.723.1, 1996, dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s.
  25. ETSI GSM Fullrate Speech Codec for Analog DevicesBlackfin, Bayer DSP Solutions, 2008.
  26. Bertini, G.,Fontata, F., Gonzalez, D.,Grassi, L., Magrini, M., 2004.Voice Transformation Algorithms with Real Time DSP Rapid Prototyping Tools, unpublished.
  27. Shaked, Y., Cole, A. L., 2004. Implementation of MELP based Vocoder for 1200/2400 bps, The EE Project Contest 2000, Technion Signal and Image Processing Lab, unpublished.
Download


Paper Citation


in Harvard Style

Duta C., Gheorghe L. and Tapus N. (2016). Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 157-166. DOI: 10.5220/0005744601570166


in Bibtex Style

@conference{icissp16,
author={Cristina-Loredana Duta and Laura Gheorghe and Nicolae Tapus},
title={Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={157-166},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005744601570166},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors
SN - 978-989-758-167-0
AU - Duta C.
AU - Gheorghe L.
AU - Tapus N.
PY - 2016
SP - 157
EP - 166
DO - 10.5220/0005744601570166