Counter mode encryption for FNBDT/MELP

被引:0
|
作者
Sleezer, R [1 ]
Daniel, E [1 ]
Raymond, J [1 ]
Brewer, J [1 ]
Teague, K [1 ]
机构
[1] Oklahoma State Univ, Stillwater, OK 74078 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Counter mode encryption is the proposed method for encrypting Mixed Excitation Linear Predictor (MELP) data for the Future NarrowBand Digital Terminal (FNBDT). Counter mode encryption employs an indefinite keypad generated by an encrypting function applied to a counter. The clear (unencrypted) data is exclusive-or-ed with the next available key in the pad. When encrypted data is received, the clear data may be retrieved by exclusive-or-ing the encrypted data with the same key used for encryption. The benefits and drawbacks of implementing counter mode encryption for real time MELP audio applications are presented.
引用
收藏
页码:692 / 695
页数:4
相关论文
共 50 条
  • [21] Enhanced counter mode
    Tarhuni, MA
    Ng, SH
    Samsudin, A
    Ng, WP
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 701 - 705
  • [22] Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory
    Yuan, Shougang
    Awad, Amro
    Zhou, Huiyang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 101 - 113
  • [23] Counter Advance for Reliable Encryption in Phase Change Memory
    Kline, Donald, Jr.
    Melhem, Rami
    Jones, Alex K.
    IEEE COMPUTER ARCHITECTURE LETTERS, 2018, 17 (02) : 209 - 212
  • [24] White-box Encryption and Link Encryption Mode Based on GPU
    Chen, Hai-Fu
    Su, Qing
    Lai, Wen-Xin
    Chen, Wei-Qi
    Bao, Jiang-Sheng
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 481 - 486
  • [25] 2D-encryption mode
    Ahmed, Magdy A.
    Belal, Ahmed A.
    Abdel-Gawad, Moez A.
    1600, Alexandria University (41): : 245 - 261
  • [26] Image encryption by cipher feedback mode
    Alsultanny, Yas A.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (03): : 589 - 596
  • [27] A Parallel XTS Encryption Mode of Operation
    Alomari, Mohammad Ahmed
    Samsudin, Khairulmizam
    Ramli, Abdul Rahman
    2009 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT: SCORED 2009, PROCEEDINGS, 2009, : 172 - 175
  • [28] Dual-mode broadcast encryption
    Yan Zhu
    Ruyun Yu
    E. Chen
    Dijiang Huang
    Science China Information Sciences, 2018, 61
  • [29] Breaking the IOC Authenticated Encryption Mode
    Bottinelli, Paul
    Reyhanitabar, Reza
    Vaudenay, Serge
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 126 - 135
  • [30] Cryptanalysis of the EPBC authenticated encryption mode
    Mitchell, Chris J.
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2007, 4887 : 118 - +