Performance Comparison between RSA and El-Gamal Algorithms for Speech Data Encryption and Decryption
Keywords:
Encryption/Decryption, Speech signal, Asymmetric cryptosystem, RSA algorithm, El-Gamal algorithmAbstract
This article presents a performance comparison of two known public key cryptography techniques namely RSA (Rivest–Shamir–Adleman) and El-Gamal algorithms to encrypt/decrypt the speech signals during transferring over open networks. Specifically, this work is divided into two stages. The first stage is enciphering-deciphering the input speech file by employing the RSA method. The second stage is enciphering-deciphering the same input speech file by employing the El-Gamal method. Then, a comparative analysis is performed to test the performance of both cryptosystems using diverse experimental and statistical analyses for the ciphering and deciphering procedures like some known speech quality measures: histogram, spectrogram, correlation, differential, speed performance and noise effect analyses. The analyses outcomes reveal that the RSA and El-Gamal approaches are efficient and adequate for providing high degree of security, confidentiality and reliability. Additionally, the outcomes indicate that the RSA speech cryptosystem outperforms its counterpart the El-Gamal speech cryptosystem in most of ciphering/deciphering speech performance metrics.
Downloads
References
Hanaa A. Abdallah and S. Meshoul, “A Multilayered Audio Signal Encryption Approach for Secure Voice Communication”, Electronics, Vol. 12, No. 1, pp. 2, 2023.
I. Yasser, Mohamed A. Mohamed, Ahmed S. Samra, and F. Khalifa, “A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications”, Entropy, Vol. 22, No. 11, pp. 1253, 2020.
Omar A. Imran, Sura F. Yousif, Isam S. Hameed, W. N. Al-Din Abed, and Ali T. Hammid, “Implementation of El-Gamal algorithm for speech signals encryption and decryption”, Procedia Computer Science, International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Vol. 167, pp. 1028–1037, 2020.
Sura F. Yousif, “Secure voice cryptography based on Diffie-Hellman algorithm”, IOP Conf. Series: Materials Science and Engineering, 2nd International Scientific Conference of Engineering Sciences (ISCES 2020), Vol. 1076, No. 1, pp. 012057, 2021.
S. Fatima, T. Rehman, M. Fatima, S. Khan, and M. A. Ali, “Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing”, Engineering Proceedings, Vol. 20, No. 1, pp. 14, 2022.
Amal H. Khaleel and Iman Q. Abduljaleel, “A novel technique for speech encryption based on k-means clustering and quantum chaotic map”, Bulletin of Electrical Engineering and Informatics, Vol. 10, No. 1, pp. 160-170, 2021.
Iman Q. Abduljaleel and Amal H. Khaleel, “Speech signal compression and encryption based on Sudoku, fuzzy C-means and threefish cipher”, International Journal of Electrical and Computer Engineering (IJECE), Vol. 11, No. 6, pp. 5049-5059, 2021.
G. Kaur, K. Singh, and H. Singh Gill, “Chaos-based joint speech encryption scheme using SHA-1”, Multimedia Tools and Applications, Vol. 80, pp. 10927-10947, 2021.
Sarah M. Abdullah and Iman Q. Abduljaleel, “Speech Encryption Technique using S - box based on Multi Chaotic Maps”, TEM Journal, Vol. 10, Issue 3, pp. 1429‐1434, 2021.
Mahmood K. Ibrahem and Hussein A. Kassim, “VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator”, Iraqi Journal of Science, pp. 240-248, 2021.
W. Dai, X. Xu, X. Song, and G. Li, “Audio Encryption Algorithm Based on Chen Memristor Chaotic System”, Symmetry, Vol. 14, No. 1, pp. 17, 2022.
S. Mokhnache, M. E.Daachi, T. Bekkouche, and N. Diffellah, “A Combined Chaotic System for Speech Encryption”, Engineering, Technology & Applied Science Research, Vol. 12, No. 3, pp. 8578-8583, 2022.
Obaida M. Al-Hazaimeh, A. A. Abu-Ein, Khalid M. Nahar, and Isra S. Al-Qasrawi, “Chaotic elliptic map for speech encryption”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 25, No. 2, pp. 1103-1114, 2022.
Nidaa F. Hassan, A. Al-Adhami, and Mohammed S. Mahdi, “Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps”, Iraqi Journal of Science, Vol. 63, No. 2, pp. 830-842, 2022.
A. u. Rehmana, X. Liao, R. Ashraf, S. Ullahc, and H. Wang, “A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2”, Optik, Vol. 159, pp. 348-367, 2018.
X. Wua, H. Kana, and J. Kurths, “A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps”, Applied Soft Computing, Vol. 37, pp. 24-39, 2015.
Sura F. Yousif, “Encryption and Decryption of Audio Signal Based on RSA Algorithm”, Vol. 5, Iss. 7, pp. 57-64, 2018.
S. Du and G. Ye, “IWT and RSA based asymmetric image encryption algorithm”, Alexandria Engineering Journal, Vol. 66, pp. 979-991, 2023.
Sura F. Yousif, “A new speech cryptosystem using DNA encoding, genetic and RSA algorithms”, International Journal of Engineering & Technology, Vol. 7, No. 4, pp. 4550-4557, 2018.
Jumadi M. Parenreng, S. Maulida, and A. Wahid, “E-mail Security System Using El-Gamal Hybrid Algorithm and AES (Advanced Encryption Standard) Algorithm”, Internet of Things and Artificial Intelligence Journal, Vol. 2, No. 1, pp. 1-9, 2022.
TIMIT Acoustic-Phonetic Continuous Speech Corpus, National Institute of Standards and Technology (NIST). https://doi.org/10.35111/17gk-bn40, 1993.
Published
How to Cite
Issue
Section
Copyright (c) 2023 Sura F. Yousif
This work is licensed under a Creative Commons Attribution 4.0 International License.