Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract—Voice communication is an important need in daily encryption as a method of improving security. The end-to-
activities whether delivered with or without technology. end encryption is used for protecting confidentiality of voice
Telecommunication technology has accommodated this need data transmitted over a GSM network. Although militaries
by providing a wide range of infrastructure, including large usually have their own secret channels for sharing
varieties of devices used as intermediary and end devices. One information over trunked radio but end to end encryption
of the cellular technologies that is very widely used by the help them to enhance the security level. The advantage of
public is GSM (Global System for Mobile), while in the end-to-end encryption is that only senders and receivers are
military, trunked radio is still popular. However, the security expected to be able to obtain valid information. It means that
systems of GSM and trunked radio have limitations. Therefore,
even though the information is tapped in the middle, an
this paper proposes a platform to secure voice data over
wireless mobile communication by providing end-to-end
outsider unable to translate the contents of the information
encryption. This platform is robust to noise, real-time and because the algorithm and the key for decrypting the data are
remains secure. The proposed encryption utilizes multicircular specifically known by trusted parties. Therefore, this
permutations rotated by expanded keys as dynamic keys to proposed platform would be very useful to be implemented
scramble the data. We carry out simulations and testbed at the military communication system.
implementation to prove that application of the proposed
method is feasible. II. CHAOTIC ENCRYPTION FOR VOICE OVER WIRELESS
RADIO
Keywords-voice encryption; chaotic algorithm; GSM network; GSM / 2G / 3G network encryption is mostly
trunked radio; multiple circular implemented close to mobile device and base station. Voice
encryption in 2G / 3G GSM networks uses COMP128, with
I. INTRODUCTION algorithms A3, A8 and A5, which can be solved in less than
Voice communication is a basic need in the delivery of two hours [6]. Meanwhile, cellular operators can intercept
information, whether through the use of technology or and store the voice communication logs of customers. The
through direct interaction. In the modern era, end-to-end framework for voice encryption over GSM
telecommunication technology has accommodated this need networks can be done by converting voice into digital form,
by providing a wide range of infrastructure, including large which is then compressed into a low bit rate format, then
varieties of devices used as intermediary and end devices. encrypted and sent via a special modem or packet switch
One of the cellular technologies that is very widely used by data services such as GPRS [7]or a circuit switch data
the public is GSM (Global System for Mobile). GSM service [8]. The challenge in encrypting voice
technology is growing rapidly in every country, so that both communication through GSM / 2G / 3G cellular networks is
the public and high-ranking state officials utilize this facility, how to encrypt, despite the limitations of GSM / 2G / 3G
both within their own countries and when using roaming in a network bandwidth, the large variety of devices used, the
foreign country. However, despite this technological number of cellular operators involved, and the number of
progress, GSM has security limitations [1] [2] [3] [4]. operating systems used by smartphones. In terms of
Security developed in GSM technology has a medium bandwidth limitations that can be passed, GSM networks
scale [5] so that, for confidential communication, one even only pass voice frequencies with a range of less than
additional feature is needed to secure information that is on a 3400 Hz or data with low rates of less than 6.5 kbps [9].
GSM network. Therefore, this paper proposes end-to-end Encryption research continues to evolve and is leading to
improvements in security aspects, resistance to interference,
102
proposed method, the data in each block is given an index TABLE I. THE SIMULATION PARAMETERS
ranging from 0 to 255. Then the data is permuted with the Parameter Value/Data
direction of the shifting position according to the value of the
Frequency sampling 16000 Hz
expanded key. Thus, the expanded key has a significant
impact on determining the change of the voice position index. Encryption block size 256
In the simulation, the expanded key is still entered manually. Voice source Indonesian phonetics [13]
So, if users enter the expanded key value randomly, the Encryption-Decryption Permutation multiple circular
permutation would rotate dynamically, and this is useful for method shrinking and expanding [11]
increasing security. Key generator Expanded key stream [11]
Figure 3. Simulation results: (a) Original Signal (b) Expanded Key (c) CPMS Signal
(d) CPME Signal (e) Encrypted Signal (f) Decrypted Signal
Figure 3 (c) and (d) sequentially is a form of a chaotic randomized according to the input expanded key entered by
permutation multicircular shrinking signal during the the user. Figure 3 (f) plots decrypted signals using
encryption process and a chaotic permutation multicircular permutations that are in the opposite direction to the
expanding signal in the decryption process. The image shows encryption process. Seen in Figure 3 (a), (e) and (f), the
randomness of changes in location in each index of voice simulation results show the similarity of the signal form at
data in one block. Figure 3 (e) plots the encryption signal or the time of the original voice, already encrypted and
the result of processing from the original voice signal after decrypted. But when the voice is heard, the encrypted voice
being mutated with a multicircular method that is will be very different from the other two voices. This
103
indicates that encryption was successfully performed. Then if we want to meet the QoS standard, there is still a
when we compare the original voice with the voice of the remaining time of 60 ms which is used to encrypt and
decryption, there is no change in the voice. This shows that decrypt. If divided equally, then 30 ms for encryption is
there is no change in the data encryption and decryption divided into ADC, encryption and DAC processes, each ≤
processes. However, the result between simulation and 10 ms; the same applies on the decryption side. This
implementation of the test bed show different value. There is calculation shows that the proposed per-block encryption
a difference between the original voice and the decrypted method is able to meet end-to-end real-time data encryption
voice that is influenced by the hardware and software on the standards.
testing device.
B. Testbed Implementation of Encryption and Decryption
The implementation of the proposed method was also
carried out by doing testing on two trunked radio units, each
of a different brand. We used trunked radio units instead of
mobile phones because we tried to use a less complex
devices system. This testbed is intended to show that
encryption is independent of the device or is universal so that
it can work on multi-vendor devices. However, in order to
simulate the EDD we used a laptop. The laptop on the
transmitter side runs ADC, encryption and DAC functions,
while on the receiver side, it runs ADC, decryption, and
DAC. The testbed specifications are shown in Table 2,
while the testbed topology is indicated in Figure 5.
Parameter Value/Data
Software Specification
Frequency sampling 16000 Hz
Encryption block size 256
Voice source Indonesian phonetics [13]
Encryption Decryption Permutation multicircular
method shrinking and expanding
[11]
Key generator Expanded key [11]
Hardware specifications
(b) Trunked Radio Transmitter Icon MDC 1200
Figure 4. Simulation Results: (a) Encryption Time (b) Decryption Time Trunked Radio Receiver HYT TC 700
EDD at Transmitter Lenovo IdeaPad S210
In the next simulation we analyze the time used for EDD at Receiver Asus
processing encryption and decryption. We consider the time
because in the encryption and decryption process, time is The test bed test results show that the decrypted voice
correlated with speed, which is an important factor in real- that has been transmitted through a trunked device has
time communication. The simulation results show that the decreased in quality. The voice heard on the receiver side is
time used for encryption all samples block is 0.65 seconds not as clear as when on the transmitter side. This can be seen
and the total decryption time for all blocks is 1.23 seconds. from the plotting of Figures 6 (a) and (b) showing a similar
The average time needed to encrypt one block of data is signal pattern while Figure 6 (c) there is a slight difference in
1.39ms and the average time required to decrypt 1.8 times the certain part.
higher namely 2.51 ms. A graph of the encryption and Based on the results of experiment, there is a problem
decryption time of each block is shown in Figure 4. arise during the implementation. It is how to determine the
Based on the simulation results, if we use a GSM precision of the encrypted data exactly as the data is
standard that has higher compression and a more decrypted after passing through a series of processes. The
sophisticated modulation technique, the encryption value per ideal condition is when the data has been encrypted and then
block can be said to be very good. This is because GSM sent to the trunked radio transmitter and decrypted – then the
imposes a maximum delay end to end on existing GSM voice should not change at all. However, the testing proved
networks of ≤ 90 ms, while the standard QoS delay for end- that after passing through EDD, the data returned to the
to-end voice data communication is ≤150 ms. From the data, analog form, which then passed the modulation process on
104
analog trunked radio, and if the trunked radio was used V. CONCLUSION
digitally, the data would go through the process of This research proposed an end-to-end voice encryption
compression and decompression. The data is then method proven by simulations and test bed implementation
transmitted through the media. When received on the data run over trunked radio devices. The simulation results show
receiver device in demodulated form, an analog signal is sent that the average time needed to encrypt voice data per block
to EDD for decryption. So, when it comes to EDD on the is 1.39 ms with a block size of 256 bits, whereas the
receiver side, it is necessary to ensure that there is no change decryption time is slightly larger, 2.52 ms. This value is very
in the data at all. Because even if there is only one „bit‟ of small compared to the delay of standard QoS for end-to-end
data changes, the decryption process will produce an encryption of voice data, namely 150 ms. The results of the
inappropriate voice. testbed indicate that implementation of the proposed method
is feasible in software and hardware. The proposed system
shows its ability to be applied in a universal way and
independent of trunked radio devices. Therefore, our next
research project will seek to develop a prototype of the
proposed system and implement it in mobile phones, which
have a more complex system.
ACKNOWLEDGMENT
This research publication is funded by PIT9 Universitas
Indonesia. Ms Hayati is in PhD study supported by Beasiswa
(a) Unggulan Dosen Indonesia Dalam Negeri (BUDI-DN),
Lembaga Pengelola Dana Pendidikan (LPDP), Cooperation
between Ministry of Research and Higher Education and
Ministry of Finance of the Republic of Indonesia.
REFERENCES
[1] G. Cattaneo, G. Maio, P. Faruolo, and U. F. Petrillo, “A Review of
Security Attacks on the GSM Standard,” in Information and
Communicatiaon Technology, vol. 7804, K. Mustofa, E. J. Neuhold,
A. M. Tjoa, E. Weippl, and I. You, Eds. Berlin, Heidelberg: Springer
Berlin Heidelberg, 2013, pp. 507–512.
[2] P. S. Vejre and A. Bogdanov, “Route 66: Passively Breaking All
GSM Channels,” in Information Security and Privacy, vol. 8544, W.
Susilo and Y. Mu, Eds. Cham: Springer International Publishing,
(b) 2014, pp. 422–429.
Figure 5. Testbed Scenario: (a) Topology System and (b) Capture of
Testbed Implementation [3] V. A. Ghafari, A. Vardasbi, and J. Mohajeri, “Cryptanalysis of GSM
Encryption Algorithm A5/173,” vol. 4, no. 2, p. 8, 2012.
[4] N. Saxena and N. S. Chaudhari, “SAKA: a secure authentication and
key agreement protocol for GSM networks,” CSI Trans. ICT, vol. 1,
no. 4, pp. 331–341, Dec. 2013.
[5] Q. Yang and L. Huang, “Mobile Network Security,” in Inside Radio:
An Attack and Defense Guide, Singapore: Springer Singapore, 2018,
pp. 267–342.
(a) [6] 3G GSM encryption cracked in less than two hours [Online]
"https://www.engadget.com/2010/01/15/3g-gsm-encryption-cracked-
in-less-than-two-hours/."
[7] P. Chumchu, A. Phayak, and P. Dokpikul, “A simple and cheap end-
to-end voice encryption framework over GSM-based networks,” in
2012 Computing, Communications and Applications Conference,
Hong Kong, China, 2012, pp. 210–214.
(b) [8] S. Islam, F. Ajmal, S. Ali, J. Zahid, and A. Rashdi, “Secure end-to-
end communication over GSM and PSTN networks,” in 2009 IEEE
International Conference on Electro/Information Technology,
Windsor, ON, Canada, 2009, pp. 323–326.
[9] Y. Suryanto and K. Ramli, “Implementation and Performance
Analysis of Reliable and Secure End to End Voice Encryption over
Public Mobile Network Based on Frequency Domain Using Dual
Processor in FPGA Platform,” vol. 5, p. 9, 2014.
[10] Y. Suryanto, Suryadi, and K. Ramli, “Chaos properties of the Chaotic
(c) Permutation generated by Multi Circular Shrinking and Expanding
Figure 6. Testbed Result: Plotting signal: (a) Original Voice (b) Encrypted Movement,” in 2015 International Conference on Quality in
signal at Transmitter (b) Decrypted Signal Receiver. Research (QiR), Lombok, Indonesia, 2015, pp. 65–68.
105
[11] Y. Suryanto and K. Ramli, “A Secure and Robust Image Encryption shrinking and expanding,” Multimed. Tools Appl., vol. 76, no. 15, pp.
Based on Chaotic Permutation Multiple Circular Shrinking and 16831–16854, Aug. 2017.
Expanding,” p. 17. [13] Speech Resources Consortium [Online]
[12] Y. Suryanto, Suryadi, and K. Ramli, “A new image encryption using “http://research.nii.ac.jp/src/en/TITML-IDN.html.” .
color scrambling based on chaotic permutation multiple circular
106