Secure Speech Communication Over a CCITT-Speech Channel

  • P. Meier
Conference paper
Part of the NATO Advanced Study Institutes Series book series (ASIC, volume 59)

Abstract

Today’s main emphasis in secure speech communication is on vocoders. However there are still a lot of CCITT-speech communication channels in use for which secure speech communication is desired. It has generally been found that to do so a compromise between cost, security and speech quality has to be chosen.

In cases where vocoders cannot be used because digital transmission of the required bit rate (normaly 2.4–4.8 kbits/sec) cannot be safely achieved, the method of speech scrambling has to be looked at.

Starting with an introduction to the “speech iceberg” which shows the elements of speech relevant to communication, the problem of scrambler security is dealt within the context of a communication system. It is shown how scramblers relate to vocoders on the one hand and waveform coding schemes suitable for analog transmission on the other hand. A definition of the security of scramblers is presented and its application is indicated and compared to the criterions used to evaluate digital ciphering systems.

It is also shown how scramblers have developped and that secure systems are possible with the modern digital technology.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. -.
    W. Baeschlin, “The Integration of Time Division. Speech Scrambling into Police Telecommunication Networks”, Proceedings 1977 International Conference on Crime Countermea-sures-Science and Engineering, University of Oxford, July 25–29, 1977, p. 141–144,Google Scholar
  2. -.
    A. M. Mc Calmont, “Quantitative Measure of Security for Analog Speech Communications Security Devices”, Carnahan Conference on Crime Countermeasures, University of Kentucky, Nay 16–18, 1979 (to be published).Google Scholar
  3. -.
    W. Diffie, M. E. Hellmann, “Privacy and Authentication: An Introduction to Cryptography”, Proceedings of the IEEE, Vol. 67, No. 3, March 1979, p. 397–427.CrossRefGoogle Scholar
  4. -.
    D. J. Goodman, B. J. Mc Dermott and L. H. Nakatani, “Subjective Evaluation of PCM Coded Speech”, The Bell System Technical Journal, Vol. 55, No. 8, October 1976, p. 1087–1109.Google Scholar
  5. -.
    A. H. Gray, J. D. Markel, “Distance Pleasure for Speech Processing”, IEEE, Vol. ASSP-24, No.5, October 1976, p. 380–391.Google Scholar
  6. -.
    J. Robra, “Verfahren zur Verschleierung von Sprachsignalen mit Hilfe orthogonaler Matrizen”, Deutsches Patentamt, Auslegeschrift 25 23 828, Anmeldetag 30.5.1975.Google Scholar
  7. -.
    D.G. Liesegang, “Möglichkeiten zur wirkungsvollen Gestaltung von Branch and Bound Verfahren dargestellt an ausgewählten Problemen der Reihenfolgeplanung”, Inaugural-Dissertation der Universität Köln, Promotion 15.7.1974.Google Scholar
  8. -.
    H.J.M. Steeneken, T. Houtgast, “MTF as a Physical Measure of the Quality of Communication Channels”, F.A.S.E., Paris 1975, p. 351–359.Google Scholar
  9. -.
    A.D. Wyner, “An Analog Scrambling Scheme which does not expand Bandwidth”, Part I: Discrete Time, IEEE, Vol. IT-25, No.3, Nay 1979 p. 261–274.MathSciNetGoogle Scholar
  10. -.
    A.D. Wyner, “An Analog Scrambling Scheme which does not expand Bandwidth”Part II: Continous Time, IEEE, Vol. IT-25, No. 4, July 1979, p. 415–425.MathSciNetGoogle Scholar

Copyright information

© D. Reidel Publishing Company 1980

Authors and Affiliations

  • P. Meier
    • 1
  1. 1.Swiss Army Signal CorpsBernSwitzerland

Personalised recommendations