International Journal of Electrical and Computer Engineering (IJECE)
Vol. 10, No. 5, October 2020, pp. 4824~4834
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp4824-4834 4824
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
A new dynamic speech encryption algorithm based on Lorenz
chaotic map over internet protocol
Obaida M. Al-Hazaimeh
Department of Computer Science and Information Technology, Al- Balqa' Applied University, Jordan
Article Info ABSTRACT
Article history:
Received Feb 3, 2020
Revised Mar 13, 2020
Accepted Mar 24, 2020
This paper introduces a dynamic speech encryption algorithm based on
Lorenz chaotic map over internet protocol to enhance the services of
the real-time applications such as increases the security level and reduces
latency. The proposed algorithm was divided into two processes: dynamic
key generation process using 128-bit hash value to dynamically alter
the initial secret keys, and encryption and decryption process using Lorenz
system. In the proposed algorithm, the performance evaluation is carried out
through efficient simulations and implementations and statistical analysis.
In addition, the average time delay in the proposed algorithm and some of
the existing algorithms such as AES is compared. The obtained results
concluded that, the proposed dynamic speech encryption algorithm is
effectually secured against various cryptanalysis attacks and has
useful cryptographic properties such as confusion and diffusion for better
voice communication in the voice applications field in the Internet.
Keywords:
AMR-WB-G.722.2
Chaos-theory
Cryptography
IP telephony
Lorenz map
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Obaida M. Al-hazaimeh,
Department of Computer Science and Information Technology,
Al- Balqa' Applied University,
21163, Jordan.
Email: dr_obaida@bau.edu.jo
1. INTRODUCTION
Voice application over Internet protocol (i.e., VoIP) is a IP telephony technology that allows
the voice data as human voice to transfers in real-time over Internet Protocol (i.e., IP) in a manner that
emulates the traditional telephone service (i.e., PSTN) [1, 2]. In general, the voice application over internet
protocol only requires an program on the end-point computer (i.e., sender, or receiver) capable of encoding
and decoding transmitting speech and Internet access [3, 4].
Voice application over internet protocol technology provides more advantages when it is compared
to the traditional telephone service. IP telephony technology is cheaper, can be integrated with other media
services, portable, and allows for more efficient bandwidth utilization. Therefore, the service providers prefer
the IP telephony technology as a method to reduce the cost over existing multimedia services. Moreover,
the infrastructure of the IP telephony is considered as a solid economical ground in building the more recent
revenue-generating services. Markedly, the deployment of IP telephony technology is becoming more
popular and is considered as an integral part of a global competitive landscape [5, 6]. Despite of all these
positive features, the IP telephony technology is facing some difficulties and challenges such as security,
packet loss, and latency. Consequently, more advanced techniques or strategies are warranted to competently
manage these difficulties, which are expected to ensure the quality of the IP telephony technology services
(i.e., QoS) [3, 7]. For example, the threat of the intruders over IP networks is the greatest security challenge
in IP telephony technology. The later will be a great concern since these offenders utilize various sniffing
tools to compromise the conversation of the IP telephony. To managing the security challenges, cryptography
serves as a valuable tool to maintain data secrecy [8, 9].