Our future work will include, modifying the filters
in the compression function (using faster filters or
filters that provide less losses) to decrease the
execution time for the already implemented
algorithms. Moreover, we intend to implement other
voice encryption algorithms, with the purpose to
provide a DSP platform that has security functions
integrated and that can be used with trust to secure
real-time sensitive communications.
ACKNOWLEDGEMENTS
This work has been funded by program Partnerships
in priority areas – PN II carried out by MEN-
UEFISCDI, project No. 47/2014.
REFERENCES
Pedre, S., Krajnik, T., Todorovich, E., Borensztejn, P.,
2016. Accelerating embedded image processing for
real time: a case study. In Journal of Real-Time Image
Processing, Vol. 11, No. 2, pp. 349-374.
Joao, J. A., Mutlu, O., Patt, Y. N., 2009. Flexible
Reference-Counting-Based Hardware Acceleration for
Garbage Collection. In Proceedings of ISCA 2009, pp.
1-11.
Daemen J., Rijmen V., 2001. Rijndael: The Advanced
Encryption Standard. In D r. Dobb's Journal, pp. 137-
139.
Biryukov, A., Khovratovich, D., 2009. Related-key
Cryptanalysis of the Full AES-192 and AES-256. In
Cryptology ePrint Archive: Report 2009/317.
Bogdanov, A., Khovratovich, D., Rechberger, C., 2011.
Biclique Cryptanalysis of the Full AES. In Advances in
Cryptology – ASIACRYPT 2011, Vol. 7073, pp. 344-
371.
Rivest, R., Shamir, A., Adleman, L., 1978. A Method for
Obtaining Digital Signatures and Public-Key
Cryptosystems. In Communications of the ACM, Vol.
21, No. 2, pp. 120-126.
Rivest, L. R., Kaliski, B., 2003. RSA Problem. In
Encyclopedia of Cryptography and Security, chapter
RSA Problem.
US Patent 6081597, 1996. Public key cryptosystem method
and apparatus. In Google Patents.
Sakshaug, H., 2007. Security Analysis of the NTRUEncrypt
Public Key Encryption Scheme. Available at
https://brage.bibsys.no/xmlui/bitstream/handle/11250/
258846/426901_FULLTEXT01.pdf (Last Accessed:
October 2016).
ADSP-BF537 Blackfin Processor Hardware Reference
Manual, Revision 3.4, 2013. Available at http://
www.analog.com/media/en/dsp-documentation/
processor-manuals/ADSP-BF537_hwr_rev3.4.pdf
(Last Accessed: October 2016).
TMS320C6711, Floating-Point Digital Signal Procesors,
2005. Available at http://www.ti.com/lit/ds/symlink
/tms320c6711c.pdf (Last Accessed: October 2016).
Wollinger, T., Guajardo, J., Paar, C., 2003. Cryptography
in embedded systems: An overview. In Proceedings of
the Embedded World 2003.
Fiskiran, M., Lee, R.B., 2002. Workload characterization
of elliptic curve cryptography and other network
security algorithms for constrained environments. In
Proceedings of the IEEE International Workshop on
Workload Characterization (WWC-5), pp. 127-137.
Wollinger, T., Wang, M., Guajardo, J., Paar, C., 2000. How
well are high-end dsps suited for the aes algorithms?
aes algorithms on the tms320c6x dsp. In AES Candidate
Conference, pp. 94-105.
Thulasimani, L., Madheswaran, M., 2010.
Design And
Implementation of Reconfigurable Rijndael Encryption
algorithms for Reconfigurable Mobile Terminals. In
International Journal on Computer Science and
Engineering, Vol. 2, No. 4, pp. 1003-1011.
Verna, H.K., Singh, R. K., 2012. Performance Analysis of
RC6, Twofish and Rijndael Block Cipher Algorithms. In
International Journal of Computer Applications, Vol.
42, No. 16, pp. 1-7.
Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.,
1999. Fast implementation of public-key cryptography
on a dsp tms320c6201. In CHES ’99: Proceedings of
the First International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 61–72.
Grobschadl, J., Tillich, S., Rechberger, C., Hofmann, M.,
Medwed, M., 2007. Energy evaluation of software
implementations of block ciphers under memory
constraints. In DATE, pp. 1110–1115.
Yen, SM., Kim, S., Lim, S., Moon, S. J., 2003. RSA speedup
with Chinese remainder theorem immune against
hardware fault cryptanalysis. In IEEE Transactions on
Computers, Vol. 52, No.4, pp. 461--472.
Er, M. H., Wong, DJ., Sethu, A., Ngeow, KS., 1991. Design
and implementation of RSA cryptosystem using multiple
DSP chips. In IEEE International Symposium on
Circuits and Systems, Vol. 1, pp. 49--52.
Ambika, D., Radha, V., 2012. Secure Speech
Communication- A Review. In International Journal of
Engineering Research and Applications, Vol. 2, No. 5,
pp. 1044-1049.
Bassalee W., Kaeli D., 2008. Resource-Conscious
Optimization of Cryptographic Algorithms on an
Embedded Architecture. Available at http://
www.ece.neu.edu/groups/nucar/publications/ODSPES
08bassalee.pdf (Last Accessed: October 2016).