Implementation of RSA Algorithm for Speech Data Encryption and Decryption

Post on 07-Jul-2015

1068 Views

Category:

Science

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

An efficient implementation of RSA algorithm for speech data encryption and decryption. At first, five hundred Bangla speech words were recorded from six different speaker and stored as RIFF (.wav) file format. Then our developed program was used to extract data from these words and this data were stored in a text file as integer data. Finally, we used our implemented program to encrypt and decrypt speech data.

Transcript

Md. Ariful HoqueRoll No: MSc 140202Discipline : CSEKhulna University

Data communication.

Vital role of Cryptography.

Phone communication.

E-commerce.

Pay-TV.

Transmitting financial information.

Video Conferencing.

2

Cryptosystem.Encryption

Decryption

Symmetric cryptosystem.

RSA cryptographic algorithm.

Uses a pair of related keys -Private key

Public key

3

Record 500 Bangla speech words.

Extract data.

Stored in a text file as integer data.

Encrypt and decrypt.

4

Speech Word

5

Recording of Bangla speech words.

Recorded as wav file.

Sampling rate 8.00 KHz.

Coded in 8 bits PCM.

Speech Word

Preprocessing and Data Extraction

6

Discard 58 bytes from beginning.

Extract require voiced data.

Contain silence, unvoiced and voice.

Stored in a text file.

Speech Word

Preprocessing and Data Extraction

Public key {e, n}

7

Speech Word

Preprocessing and Data Extraction

Encryption Process

8

Public key {e, n}

Speech Word

Preprocessing and Data Extraction

Encryption Process

Private key {d, n}

Public key {e, n}

9

Speech Word

Preprocessing and Data Extraction

Encryption Process

Decryption Process

Public key {e, n}

10

Private key {d, n}

Speech Word

Preprocessing and Data Extraction

Encryption Process

Decryption Process

Original Speech Word

Private key {d, n}

Public key {e, n}

11

12

13

Random Number Generator

14

Random Number Generator

Rand FIFO

15

Random Number Generator

Rand FIFO

PrimalityTester

16

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

17

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

18

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

n

19

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

gcd(e, ∅(n))=11<e< ∅(n)

n

20

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

gcd(e, ∅(n))=11<e< ∅(n)

e n

21

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

gcd(e, ∅(n))=11<e< ∅(n)

e.d =1mod ∅(n0 ≤d ≤n

e n

22

Random Number Generator

Rand FIFO

PrimalityTester

Prime FIFO

N=p*q∅(n)=(p-1)(q-1)

gcd(e, ∅(n))=11<e< ∅(n)

e.d =1mod ∅(n0 ≤d ≤n

d e n

23

e n Public key

24

d

e n

n

Public key

Private key

25

M

26

M

e

n

27

M

e

n

Modular Exponentiation Me mod n

28

M

e

n

CModular Exponentiation Me mod n

29

C

30

C

d

n

31

C

d

n

Modular Exponentiation Cd mod n

32

C

d

n

MModular Exponentiation Cd mod n

33

Input: A, B, n Output: E = AB mod n

LR binary method

E <= 1; for i = k-1 to 0

If Bi =1E <= A*E mod nend if

if i ≠ 0 E <= E*E mod n; end if

end for return E;

34

Objective.

500 speech words recorded.

Saved as .wav format.

Extracted integer data.

Taken txt file as input.

Produce unreadable message.

35

RSA algorithm used to encrypt and decrypt.

M lies in the range .

Encrypt 500 word at a time.

Limitations.

36

Thanks To All

37

top related