Font Size: a A A

A Voice Chaos Secure Communication Based On Multicast And WAN Transmission And Realization On ARM

Posted on:2017-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y GanFull Text:PDF
GTID:2308330485478389Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of network information technology like mobile Internet, social networking, big data and cloud computing, people are increasingly concerned about the security of communications for multimedia data, such as images, voice and video. Because the multimedia data is massive, real-time and has a strong correlation, the traditional encryption algorithm like DES and AES for text is no longer safe. Meanwhile new technologies such as chaos are attracting a growing number of scholars to study, and also a variety of chaos algorithms have been designed.This paper proposes a real-time voice communication system based on three-level chaotic encryption scheme and its implements in the ARM platform, which transfers data by multicast in LAN and duplex in WAN. In this system, the 16bits digital voice from the sound card will be compressed by an IMA-ADPCM compression algorithm and then encrypted by the three-level chaotic encryption scheme. In the first level of chaotic encryption, position of per bit data in each frame compressed data is permuted randomly using 6D chaotic map. Secondly, position of per byte data in the encrypted data is permuted again using 7D chaotic map. At last, the data is operated with a multi-round chaotic stream cipher.This program reflects two features. In the first, the redundancy is reduced effectively and the corresponding unicity distance is increased from compressing to encrypting; secondly, the three-level chaotic encryption scheme can further enhance the security of the whole system, while fully meet the aspect of real-time requirements. Finally, these three schemes prove the availability of the system which basically contain several transmission channels of today’s computer networks. This paper shows the design of the entire system, security analysis and results of hardware implementation. We can have the conclusions that the system is available, easy to use, real-time and safe. And it has some innovations and significance like these:(1)The system is not a simple superimposed function, but rather complement each other, balancing security with real-time. And it is encrypted by the whole data instead of partially encrypted so that improves the security.(2) In the experiment, we transport the real-time encrypted voice data via multicast in LAN and unicast in WAN beside of unicast in LAN with good results. It is further meaningful than previous studies only in theory.(3) Compared with previous studies on real-time voice communication based on chaotic encryption scheme, this issue has safety analysis beside of hardware or has hardware beside of safety analysis.
Keywords/Search Tags:Chaos, Real-time Voice, Embedded ARM, Multicast, WAN, NIST, WIFI
PDF Full Text Request
Related items