Font Size: a A A

The Research And Implementation Of Speech Scrambler

Posted on:2015-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:G C TengFull Text:PDF
GTID:2308330479479405Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Voice encryption has a very important role in modern communication technologies confidentiality.When it comes to secure voice communications,government,and military and other confidential departments should adopt or commercial organizations,civilian areas and other methods of voice encryption.Before entering the transfer device to his voice encryption method,by reducing the secret information and the communication line is tapped by a third party interception result,the risk of eavesdropping or tampering on,is very effective.Thesis achieved with STM32 and AIC23 core build hardware platform for the communication terminals,designed a study in sending encrypted voice terminal before receiving universal voice encryptor.Paper theoretically clarify the manner in which the working principle and structure of the module,and a lot of software and hardware to work,based on the realization of the module and proved the effectiveness and feasibility of the voice encryption process.The main work is as follows:1.This paper introduces the hardware platform of the module on the system hardware design and system architecture will be described,and detailed exposition of the principle of the chip and hardware platforms,including the parameters of the chip,charts,and terminal connection method,and how Get a unique serial number,and so on.2.Research work carried out for the part of the system software modules in detail,software systems,hardware platforms play a role in driving the entire cryptographic module,in this section,the paper analyzes the effect of various software modules and data processing,debugging part of the work required input and output software,hardware,and self-test part of the initialization part of the development board,and voice signals.3.Voice processing section,the paper describes the methods and procedures for processing the collected voice signals involved in the proposed theoretical system design and analysis of experiments,the experimental results of studies that illustrate the feasibility of using this theoretical system,the main including the principle of speech processing,implementation and performance.4.Principles of data encryption algorithm and key encryption algorithm cipher algorithm section to clarify the use of data processing,design of experiments,the experimental data encryption and decryption operations,and analysis of the effect of the cryptographic module.The main contents include data were constructed and keys for encryption,decryption password system,a password system to achieve voice encryption and decryption algorithms,and performance testing encryption algorithm and its effect on the experimental data through the program.This realization voice encryption device,with good strength encryption,decryption sound;versatility,can be used in tandem,then clear voice communication between any terminal.It not only applies to confidential communications confidential departments,while as a low-cost,applicability voice encryption,in the civilian aspects also have a broad scope and market prospects.
Keywords/Search Tags:Voice Encryption, Asynchronous mode modulus, RSA, Stream Cipher, STM32
PDF Full Text Request
Related items