BibTex RIS Cite

Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem

Year 2014, , 54 - 58, 03.11.2014
https://doi.org/10.18100/ijamec.68742

Abstract

Securing a communication is always a challenge for participants in it. A lot of applications available in the market claim to enable secure audio communication, but not always show the details of the technology used behind to encrypt the data. It is important for end users to understand the techniques used for encrypting the data, in order to trust it. Elliptic curve cryptography, an approach to public key cryptography, is now widely used in cryptographic systems. Hence, in this paper we propose using elliptic curve cryptography to secure the transmission of voice messages through the network. The system that is proposed and implemented enables the encryption of the voice message, its transmission through the network and its decryption at the other end.

References

  • Shoewu, O. and S.O. Olatinwo. 2013. “Securing Text Messages using Elliptic Curve Cryptography Orthogonal Frequency Division Multiplexing”.
  • Nils Gura, Arun Patel, Arvinderpal Wander, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, 2004.
  • Fuwen Liu, A Tutorial on Elliptic Curve Cryptography (ECC), https://www-rnks.informatik.tu-cottbus.de/content/unrestricted/staff/lfw/A%20tutorial%20of%20elliptic%20curve%20cryptography.pdf [15.12.2013].
  • Christof Paar and Jan Pelzi, Understanding Cryptography, http://wiki.crypto.rub.de/Buch/download/Understanding_Cryptography_Chptr_9---ECC.pdf [15.12.2013].
  • Design of Secure Computer Systems CSI4138/CEG4394, Dr Jean-Yves Chouinard, 2002.
  • WAVE PCM soundfile format. https://ccrma.stanford.edu/courses/422/projects/WaveFormat/ [15.12.2013].
  • Socket Class, http://msdn.microsoft.com/en-us/library/system.net.sockets.socket(v=vs.110).aspx [15.12.2013].

Original Research Paper

Year 2014, , 54 - 58, 03.11.2014
https://doi.org/10.18100/ijamec.68742

Abstract

References

  • Shoewu, O. and S.O. Olatinwo. 2013. “Securing Text Messages using Elliptic Curve Cryptography Orthogonal Frequency Division Multiplexing”.
  • Nils Gura, Arun Patel, Arvinderpal Wander, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, 2004.
  • Fuwen Liu, A Tutorial on Elliptic Curve Cryptography (ECC), https://www-rnks.informatik.tu-cottbus.de/content/unrestricted/staff/lfw/A%20tutorial%20of%20elliptic%20curve%20cryptography.pdf [15.12.2013].
  • Christof Paar and Jan Pelzi, Understanding Cryptography, http://wiki.crypto.rub.de/Buch/download/Understanding_Cryptography_Chptr_9---ECC.pdf [15.12.2013].
  • Design of Secure Computer Systems CSI4138/CEG4394, Dr Jean-Yves Chouinard, 2002.
  • WAVE PCM soundfile format. https://ccrma.stanford.edu/courses/422/projects/WaveFormat/ [15.12.2013].
  • Socket Class, http://msdn.microsoft.com/en-us/library/system.net.sockets.socket(v=vs.110).aspx [15.12.2013].
There are 7 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Artan Luma

Besnik Selimi This is me

Lirim Ameti This is me

Publication Date November 3, 2014
Published in Issue Year 2014

Cite

APA Luma, A., Selimi, B., & Ameti, L. (2014). Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem. International Journal of Applied Mathematics Electronics and Computers, 2(4), 54-58. https://doi.org/10.18100/ijamec.68742
AMA Luma A, Selimi B, Ameti L. Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem. International Journal of Applied Mathematics Electronics and Computers. December 2014;2(4):54-58. doi:10.18100/ijamec.68742
Chicago Luma, Artan, Besnik Selimi, and Lirim Ameti. “Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem”. International Journal of Applied Mathematics Electronics and Computers 2, no. 4 (December 2014): 54-58. https://doi.org/10.18100/ijamec.68742.
EndNote Luma A, Selimi B, Ameti L (December 1, 2014) Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem. International Journal of Applied Mathematics Electronics and Computers 2 4 54–58.
IEEE A. Luma, B. Selimi, and L. Ameti, “Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem”, International Journal of Applied Mathematics Electronics and Computers, vol. 2, no. 4, pp. 54–58, 2014, doi: 10.18100/ijamec.68742.
ISNAD Luma, Artan et al. “Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem”. International Journal of Applied Mathematics Electronics and Computers 2/4 (December 2014), 54-58. https://doi.org/10.18100/ijamec.68742.
JAMA Luma A, Selimi B, Ameti L. Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem. International Journal of Applied Mathematics Electronics and Computers. 2014;2:54–58.
MLA Luma, Artan et al. “Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem”. International Journal of Applied Mathematics Electronics and Computers, vol. 2, no. 4, 2014, pp. 54-58, doi:10.18100/ijamec.68742.
Vancouver Luma A, Selimi B, Ameti L. Audio Message Transmitter Secured Through Elliptical Curve Cryptosystem. International Journal of Applied Mathematics Electronics and Computers. 2014;2(4):54-8.

Cited By

Java библиотека для работы с эллиптическими кривыми
Современные инновации, системы и технологии - Modern Innovations, Systems and Technologies
https://doi.org/10.47813/2782-2818-2023-3-2-0225-0233