Counter mode encryption for FNBDT/MELP

被引:0
|
作者
Sleezer, R [1 ]
Daniel, E [1 ]
Raymond, J [1 ]
Brewer, J [1 ]
Teague, K [1 ]
机构
[1] Oklahoma State Univ, Stillwater, OK 74078 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Counter mode encryption is the proposed method for encrypting Mixed Excitation Linear Predictor (MELP) data for the Future NarrowBand Digital Terminal (FNBDT). Counter mode encryption employs an indefinite keypad generated by an encrypting function applied to a counter. The clear (unencrypted) data is exclusive-or-ed with the next available key in the pad. When encrypted data is received, the clear data may be retrieved by exclusive-or-ing the encrypted data with the same key used for encryption. The benefits and drawbacks of implementing counter mode encryption for real time MELP audio applications are presented.
引用
收藏
页码:692 / 695
页数:4
相关论文
共 50 条
  • [41] Invertible universal hashing and the TET encryption mode
    Halevi, Shai
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 412 - 429
  • [42] The mF mode of authenticated encryption with associated data
    Chakraborty, Bishwajit
    Nandi, Mridul
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2022, 16 (01) : 73 - 97
  • [43] An attack on CFB mode encryption as used by OpenPGP
    Mister, S
    Zuccherato, R
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 82 - 94
  • [44] On the security of the CCM encryption mode and of a slight variant
    Fouque, Pierre-Alain
    Martinet, Gwenaelle
    Valette, Frederic
    Zimmer, Sebastien
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 411 - +
  • [45] A fundamental flaw in the ++AE authenticated encryption mode
    Al Mahri, Hassan Qahur
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 37 - 42
  • [46] A proposed mode for triple-DES encryption
    Coppersmith, D
    Johnson, DB
    Matyas, SM
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1996, 40 (02) : 253 - 262
  • [47] Double-Hashing Operation Mode for Encryption
    Almuhammadi, Sultan
    Amro, Ahmad
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [48] Attacks on the Authenticated Encryption Mode of Operation PAE
    Chakraborty, Debrup
    Nandi, Mridul
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5636 - 5642
  • [49] Periodic Characteristics of Output Feedback Encryption Mode
    Kuznetsov, Alexandr
    Kolovanova, Ievgeniia
    Kuznetsova, Tetiana
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 193 - 198
  • [50] Analysis of SHA-1 in encryption mode
    Handschuh, H
    Knudsen, LR
    Robshaw, MJ
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 70 - 83