Skip to main content

Using Elliptic Curve Encryption and Decryption for Securing Audio Messages

  • Conference paper

Abstract

The security of message transmission is usually a challenge for its participants. Many available programs that work with audio data claim to enable secured communication, but usually do not show the details of the methods used for data encryption. For end users to be confident, it is essential to be aware of the methods and techniques used for data encryption and decryption. Elliptic curve cryptography, an approach to public key cryptography, is now commonly used in cryptosystems. Hence, in this paper we present a method for using elliptic curve cryptography in order to secure audio data communications. Furthermore, we present a tool that implements this method for encrypting an audio file, transmitting it through the network and decrypting the file at the other end.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22 6, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  2. Rivest,R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Google Scholar 

  3. Shoewu, O., Olatinwo, S.O.: Securing text messages using elliptic curve cryptography and orthogonal frequency division multiplexing. Pac. J. Sci. Technol. 14, 220–227 (2013)

    Google Scholar 

  4. Luma, A., Ameti, L.: ECC secured voice transmitter. Lecture notes in engineering and computer science: Proceedings of The World Congress on Engineering 2014, WCE 2014, London, pp. 488–491. 2–4 July 2014

    Google Scholar 

  5. Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. In: Towards a Quarter-Century of Public Key Cryptography, pp. 103–123. Springer (2000)

    Google Scholar 

  6. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, August 2004

    Google Scholar 

  7. Blake, I., Seroussi, G., Smart, N.: Advances in elliptic curve cryptography. London Mathematical Society Lecture Note Series, vol. 317, Cambridge University Press, Cambridge (2005)

    Google Scholar 

  8. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptograph. Springer-Verlag, New York (2004). ISBN 0-387-95273-X

    Google Scholar 

  9. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology – CRYPTO 2001, pp. 213–229. Springer, Berlin/Heidelberg (2001)

    Google Scholar 

  10. Stallings, W.: Cryptography and network security (4th Edition). Prentice-Hall, Inc., Upper Saddle River, New Jersey (2005)

    Google Scholar 

  11. Microsoft Corporation: WAVE and AVI Codec registries – RFC 2361. IETF. http://tools.ietf.org/html/rfc2361 (1998). Retrieved 15 Dec 2013

  12. Library of Congress: (2008-09-12). WAVE. Waveform audio file format. http://www.digitalpreservation.gov/formats/fdd/fdd000001.shtml (2008). Retrieved 15 Dec 2013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artan Luma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Luma, A., Selimi, B., Ameti, L. (2015). Using Elliptic Curve Encryption and Decryption for Securing Audio Messages. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9804-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9804-4_42

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9803-7

  • Online ISBN: 978-94-017-9804-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics