International Journal of Electrical and Computer Engineering (IJECE) Vol. 10, No. 5, October 2020, pp. 4824~4834 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i5.pp4824-4834 4824 Journal homepage: http://ijece.iaescore.com/index.php/IJECE A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol Obaida M. Al-Hazaimeh Department of Computer Science and Information Technology, Al- Balqa' Applied University, Jordan Article Info ABSTRACT Article history: Received Feb 3, 2020 Revised Mar 13, 2020 Accepted Mar 24, 2020 This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol to enhance the services of the real-time applications such as increases the security level and reduces latency. The proposed algorithm was divided into two processes: dynamic key generation process using 128-bit hash value to dynamically alter the initial secret keys, and encryption and decryption process using Lorenz system. In the proposed algorithm, the performance evaluation is carried out through efficient simulations and implementations and statistical analysis. In addition, the average time delay in the proposed algorithm and some of the existing algorithms such as AES is compared. The obtained results concluded that, the proposed dynamic speech encryption algorithm is effectually secured against various cryptanalysis attacks and has useful cryptographic properties such as confusion and diffusion for better voice communication in the voice applications field in the Internet. Keywords: AMR-WB-G.722.2 Chaos-theory Cryptography IP telephony Lorenz map Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Obaida M. Al-hazaimeh, Department of Computer Science and Information Technology, Al- Balqa' Applied University, 21163, Jordan. Email: dr_obaida@bau.edu.jo 1. INTRODUCTION Voice application over Internet protocol (i.e., VoIP) is a IP telephony technology that allows the voice data as human voice to transfers in real-time over Internet Protocol (i.e., IP) in a manner that emulates the traditional telephone service (i.e., PSTN) [1, 2]. In general, the voice application over internet protocol only requires an program on the end-point computer (i.e., sender, or receiver) capable of encoding and decoding transmitting speech and Internet access [3, 4]. Voice application over internet protocol technology provides more advantages when it is compared to the traditional telephone service. IP telephony technology is cheaper, can be integrated with other media services, portable, and allows for more efficient bandwidth utilization. Therefore, the service providers prefer the IP telephony technology as a method to reduce the cost over existing multimedia services. Moreover, the infrastructure of the IP telephony is considered as a solid economical ground in building the more recent revenue-generating services. Markedly, the deployment of IP telephony technology is becoming more popular and is considered as an integral part of a global competitive landscape [5, 6]. Despite of all these positive features, the IP telephony technology is facing some difficulties and challenges such as security, packet loss, and latency. Consequently, more advanced techniques or strategies are warranted to competently manage these difficulties, which are expected to ensure the quality of the IP telephony technology services (i.e., QoS) [3, 7]. For example, the threat of the intruders over IP networks is the greatest security challenge in IP telephony technology. The later will be a great concern since these offenders utilize various sniffing tools to compromise the conversation of the IP telephony. To managing the security challenges, cryptography serves as a valuable tool to maintain data secrecy [8, 9].