Secure voice
From Wikipedia, the free encyclopedia
Secure voice (alternatively secure speech or ciphony) is a term in cryptography for devices which are designed to provide voice encryption for voice communication over a range of communication types such as radio, telephone or IP.
A digital secure voice usually includes two components, a digitizer to convert between speech and digital signals and an encryption system to provide confidentiality. What makes ciphony difficult in practice is a need to send the encrypted signal over the same circuits used to transmit unencrypted voice, e.g. telephones or mobile radios. This leads to the use of vocoders to achieve tight bandwidth compression of the speech signals. NSA's STU-III, KY-57 and SCIP are examples of systems that operate over existing voice circuits. The STE system, by contrast, requires wide bandwidth ISDN lines for its normal mode of operation.
[edit] See also
- Scrambler
- Delilah (secure speech)
- SIGSALY
- Secure telephone
- Secure Terminal Equipment
- VINSON
- VoIP VPN
- ZRTP
[edit] References
- Randall K. Nichols and Panos C. Lekkas, Wireless Security: Models, Threats, and Solutions, McGraw-Hill, 2002, chapter 6, "Speech cryptology", ISBN 0-07-138038-8.
Cipher machines |
---|
Rotor machines: CCM | Enigma | Fialka | Hebern | HX-63 | KL-7 | Lacida | M-325 | Mercury | NEMA | OMI | Portex | SIGABA | SIGCUM | Singlet | Typex |
Mechanical: Bazeries cylinder | C-36 | C-52 | CD-57 | Cipher disk | HC-9 | Kryha | Jefferson disk | M-94 | M-209 | Reihenschieber | Scytale |
Teleprinter: 5-UCO | BID 770 | KW-26 | KW-37 | Lorenz SZ 40/42 | Siemens and Halske T52 |
Secure voice: KY-3 | KY-57 | KY-58 | KY-68 | OMNI | SIGSALY | STE | STU-II | STU-III | VINSON | SCIP | Sectéra Secure Module |
Miscellaneous: Cryptex | JADE | KG-84 | KL-43 | Noreen | PURPLE | Pinwheel | Rockex |
Cryptography |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |