SPEECH: Secure Personal End-to-End Communication with Handheld

  • A. Castiglione
  • G. Cattaneo
  • A. De Santis
  • F. Petagna
  • U. Ferraro Petrillo


Nowadays, there is a strong trend toward the integration of public communication networks. This is especially the case of the mobile phone networks and the Internet, which are becoming increasingly interconnected as to create a single unified network. One of the possible consequences of this integration is that the security issues, which already exist within each of these networks, become even more menacing in such an enlarged context. The possibility to operate voice calls is one of the most popular services that run on these networks. At the time of this writing, the user who calls another user by means of a mobile phone or a desktop computer equipped with Voice-over-IP software is subject to several threats. In this paper, we examine some of these threats and present SPEECH, a software system for making “secure” calls by using Windows Mobile 2003 powered handheld devices and a wireless data communication channel.

The notion of Security implemented by SPEECH is stronger than the one available in other secure conversation software, because it includes the mutual authentication of the endpoints of the conversation, the end-to-end digital encryption of the content of a conversation and the possibility to digitally sign the conversation content for non-repudiation purpose. SPEECH is able to operate on different types of networks and adapt its behaviour to the bandwidth of the underlying network while guaranteeing a minimal-acceptable quality of service (currently GSM and TCPIIP networks are supported). This has been achieved by adopting a very light communication protocol and by using a software codec explicitly optimized for the compression of voice data streams while retaining a good sampling quality. As a result, SPEECH is able to work in full-duplex mode, with just a slight delay in the conversation, even when using a 9600 bps communication channel, such as the one provided by GSM networks.

There are several application areas for SPEECH. For example, it can be used in an economic transaction conducted over a public phone line to verify the real identities of the parties who are participating to the transaction, to prevent the possibility for an eavesdropper to access the content of the conversation and to ensure that either party of the call could not deny the content of the conversation in a later moment.


Advance Encryption Standard Mutual Authentication Security Feature Secure Personal Mobile Phone Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BaBKO3]
    E. Barkan, E. Btham, N. Keller: “Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication”. In Proceedings of Advances in Cryptology-CRYPTO 2003, 2003, LNCS 2729, pp. 600–616, Springer-Verlag.Google Scholar
  2. [Casper]
    Casper Technology. Available from: http://www.caspertech.com/
  3. [Go1i97] J. D. Golic: “Cryptanalysis of alleged A5 stream cipher”. In Proceedings of Advances in Cryptology-EUROCRYPT’97: International Conference on Theory and Application of Cryptographic Techniques, 1997, LNCS 1233, pp. 239–255, Springer-Verlag.Google Scholar
  4. [ValiO6]
  5. [Gesell]
    Gesellschaft für Sichere Mobile Kommunikation mbH. Available from: http://www.cryptophone.de/
  6. [ShAt85]
    M. Schroeder, B. Atal: “Code-excited linear prediction (CELP): High-quality speech at very low bit rates”. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. 1985, Vol. 3, pp. 937–940.Google Scholar
  7. [GeDyC4]
    General Dynamics C4 Systems. Available from: http://www.gdc4s.com/.
  8. [Vectro]
    VectroTEL. Available from: http://www.vectrotel.chl
  9. [GTeckl]
    Global Teck. Available from: http://www.global-teck.com/
  10. [SeGSM]
    SecureGSM. Available from: http://www.securegsm.com/
  11. [NautSP]
    Nautilus Secure Phone. Available from: http://nautilus.berlios.de/
  12. [Rahn93]
    M. Rahnema: “Overview of the GSM System and Protocol Architecture”. In: IEEE Communications Magazine. 1993, Vol. 31, pp. 92–100.CrossRefGoogle Scholar
  13. [Sham79]
    Adi Shamir: “How to share a secret”. In: Communications of the ACM. 1979, Vol. 22 no.1, pp. 612–613.MATHCrossRefMathSciNetGoogle Scholar
  14. [Skype]
    Skype. Available from: http://www.skype.com.
  15. [BDG+04]
    0. Benoit, N. Dabbous, L. Gauteron, P. Girard, H. Handschuh, D. Naccache, S. Socié, C. Whelan: Mobile terminal security. Available from “Cryptology ePrint Archive” as Report 2004/158 at: http://eprint.iacr.org/.
  16. [NISTO2]
    National Institute of Standards and Technology (NIST), “The Secure Hash Signature Standard. (FIPS PUB 180-2)”. August 2002. Available from: http://csrc.nist.gov/publications/fips/fipsl8O-2/fipsl8O-2withchangenotice.pdf.
  17. [DiAl99]
    T. Dierks, C. Allen: The TLS Protocol Version 1.0. IETF RFC 2246. 1999.Google Scholar
  18. [NISTO1]
    National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES) (FIPS PUB 197)”. November 2001, Available from: http://csrc.nist.gov/publications/fips/fipsl97/fips-197.pdf
  19. [DiHe76]
    W. Diffie, M. Hellman: “New Directions In Cryptography”. In: IEEE Transactions on Information Theory. 1976, vol. 22 no. 6, pp. 644–654.MATHCrossRefMathSciNetGoogle Scholar
  20. [ScRo99]
    H. Schulzrinne, J. Rosenberg: “Internet telephony: Architecture and protocols-an IETF perspective”. In: Journal of Computer Networks. Elsevier Science B.V., 1999, vol. 31, no. 3, pp. 237–255.CrossRefGoogle Scholar
  21. [NatoC3]
    NATO Consultation, Command and Control Agency (NC3A). “Secure Communication Interoperability Protocol (SCIP)”. Available from: http://elayne.nc3a.nato.int/msec/scip/index.html.

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • A. Castiglione
    • 1
  • G. Cattaneo
    • 1
  • A. De Santis
    • 1
  • F. Petagna
    • 1
  • U. Ferraro Petrillo
    • 2
  1. 1.Dipartimento di Informatica ed Applicazioni “R.M. Capocelli”Università degli Studi di SalernoFisciano (SA)
  2. 2.Dipartimento di Statistica, Probabilità e Statistiche ApplicateUniversità degli Studi di Roma — “La Sapienza”Roma

Personalised recommendations