Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم

Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم

Voice Encryption Using Twin Stream Cipher Algorithm تشفير الصوت باستخدام خوارزمية التوأم اﻻنسيابية Prepared by Omar Mejbel Hammad Aljouani ((401320142)) Supervisor Dr. Hebah H. O. Nasereddin Dr. Abdulkareem O. Ibadi Master Thesis Submitted in Partial Fulfillment of the Requirements of the Master Degree in Computer Science Department of Computer Science Faculty of Information Technology Middle East University Amman - Jordan January - 2016 II ((بسم هللا الرحمن الرحيم(( ّ يَ ْر ف عَََللاَهَا ّل ذي نََآ مَ هنواَ م ْن هك ْمََ وَا ّلَ ذي نََ} ه ه ْ ْ {أَوتواَال عل مََ دَ ر جات ))صدق هللا العظيم(( II III IV Acknowledgment I utilize this opportunity to thank everyone helped me reach this stage and everyone who encourage me during performing this thesis. I want to thank Dr. Hebah H. O. Nasereddin for her guidance and supervision during writing this thesis. Extended thanks are also for my family and friends who encourage me during writing this thesis. I also want to thank everyone who believes that the knowledge is right for everyone. The greatest thank ever to assistant prof. Abdulkareem O. Ibadi, the head of software engineering department at Baghdad College for economic sciences. V Dedication اهدي خﻻصة جهدي العلمي المتواضع الى : قرة عيني الرسول محمد عليه افضل الصﻻة واتم التسليم ...... وطني العراق الجريح .................................... اخي الشهيد الحاضر الغائب صهيب ................... والدي ووالدتي واختي رفاق دربي ومسيرتي ............... كل من كان له بصمة بجهدي العلمي هذا............. كل الشهداء الذين استشهدوا برصاص الغدر والخيانة ...... كل من كان يدعي لي ويوجهني ويتمنى لي الخير ......... جامعة بغداد أخص بها كلية التربية ابن الهيثم ....... اﻻعدادية المركزية للبنين .................. VI Table of Contents AUTHORIZATION STATEMENT ........................................................... II EXAMINATION COMMITTEE DECISION …………..………..III Acknowledgements......................................................................…......IV dedication… ...........................................................................................V Table of contents…………………………………………………….VI List of Figures…………………………………………………………VIII List of Tables…………………………………………………………..IX List of Abbreviations…………………………………………………X Abstract ..................................................................................................XI XII .......................................................................................................... الملخص Chapter One Introduction ............................................................................ 1 1 Chapter One Introduction ........................................................................ 2 1.1 Introduction ................................................................................................ 2 1.1.1 Stream Cipher............................................................................................................. 6 1.1.2 Advantages of Stream Cipher ................................................................................... 7 1.1.3 Shift Registers ........................................................................................................... 8 1.1.4 Linear-Feedback Shift Register ................................................................................. 9 1.1.5 Feedback with Carry Shift Registers ....................................................................... 10 1.1.6 Non-Linear Feedback Shift Registers ..................................................................... 11 1.1.7 Non-linear combiner of LFSRs ............................................................................... 11 1.1.8 Random Properties of Sequences ............................................................................ 12 1.2 Research Problem .................................................................................... 13 1.3 Research Objectives ................................................................................. 14 1.4 Motivation ................................................................................................ 15 1.5 Significance of Work ............................................................................... 15 1.6 Thesis outline ........................................................................................... 15 Chapter Two Backgrounds and Literature Review ................................ 17 2 Chapter Two Background and Literature Review .............................. 18 2.1 Overview .................................................................................................. 18 2.2 Background .............................................................................................. 18 2.2.1 Stream Cipher Usage................................................................................................ 19 2.2.2 Stream Cipher Security ............................................................................................ 20 VII 2.2.3 Types of Stream Cipher ........................................................................................... 21 2.2.3.1 Synchronous Stream Ciphers ……………………….………………………….21 2.2.3.2 Self-Synchronizing Stream Ciphers……………………………..…………………...22 2.2.4 Comparison of Stream Cipher .................................................................................. 22 2.3 Literature review ...................................................................................... 23 Chapter Three Research Methodology ..................................................... 32 3 Chapter Three Research Methodology ................................................. 33 3.1 Introduction .............................................................................................. 33 3.2 The Twin Concept ................................................................................... 35 3.3 Stream Cipher Algorithm ......................................................................... 35 3.4 The Proposed Twin Stream Cipher Algorithm ........................................ 36 3.5 The Combining Part ................................................................................. 36 3.6 The Driving Part ...................................................................................... 38 3.7 The Proposed Twin Stream Cipher Algorithm ........................................ 40 Chapter Four ............................................................................................... 42 Results and Discussion ................................................................................ 42 4 Chapter Four Results and Discussion ................................................... 43 4.1 Overview .................................................................................................. 43 4.2 The Based Algorithm Testing .................................................................. 44 4.3 The Twin Algorithm Testing ................................................................... 47 Chapter Five Conclusions and Future Work ........................................... 52 5 Chapter Five Conclusions and Future Work ....................................... 53 5.1 Conclusion ............................................................................................... 53 5.2 Future work .............................................................................................. 55 References .................................................................................................... 56 Appendix ...................................................................................................... 61 VIII List of Figures Figures Page Figure 1.1 Cryptology Classification (Ibadi, 2010) 3 Figure 1.2 Stream Cipher (Abdulsalam, 2011) 7 Figure 1.3 Shift Register with Feedback (Hell, Johansson, Maximov and Meier, 2006) 9 Figure 1.4 Linear Feedback Shift Register (Hell, Johansson and Meier, 2006) 9 Figure 1.5 Feedback with Carry Shift Register (Arnault, Berger and Pousse, 2011) 10 Figure 3.1 Methodology Block Diagram 34 Figure 3.2 Twin Algorithm Main Components 35 Figure 3.3 Stream Cipher Algorithm Parts 35 Figure 3.4 The Non-linear Part 37 Figure 3.5 The Driving Part of The Stream Cipher Algorithm 38 Figure 3.6 The Proposed Stream Cipher Algorithm 39 Figure 3.7 The Proposed Twin Stream Cipher Algorithm 44 Figure 3.8 Interface of the Proposed Algorithm 44 Figure 3.9 The Proposed Program Result 44 Figure 4.1 Interface of Twin Stream Cipher Algorithm 43 Figure 4.2 Twin Stream Cipher Algorithm Program Giving Results 43 Figure 4.3 The Statistical Test Program 54 Figure 4.4 The Statistical Test Program Results 54 IX List of Tables Table Page Table 2.1: Comparison of Stream Cipher 23 Table 3.1: The Truth Table of The Proposed Function 37 Table 4.1: The Based Algorithm Testing (6003 & 500 bits) 44 Table 4.2: The Based Algorithm Testing (6003 & 500 bits) 45 Table 4.3: New High Speed Stream Cipher Algorithms 46 Table 4.4 The Twin Algorithm Testing (5003 & 800 Bits) 47 Table 4.5 The Twin Algorithm Testing (6000 & 400 Bits) 48 Table 4.6 The Twin Algorithm Testing (24 & 22 Bits) 49 Table 4.7: The Twin Algorithm Testing (6000 & 400 bits) 54 X List of Abbreviations SR Shift Register FSR Feedback Shift Register LFSR Linear Feedback Shift Register FCSR Feedback with Carry Shift Register NLFSR Non-linear Feedback Shift Registers FPGA Field Programmable Gate Arrays ANF Algebraic Normal Form PR The Bernoulli Trials XI Abstract Voice Encryption Using Twin Stream Cipher Algorithm Prepared By: Omar Mejbel Hammad ((401320142)) Supervised By: Dr. Hebah H. O. Nasereddin. Dr. Abdelkareem. O.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    114 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us