Skip to main content

Analogue Speech Security Systems

  • Conference paper
  • First Online:
Cryptography (EUROCRYPT 1982)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 149))

Included in the following conference series:

Abstract

Speech is probably the most fundamental form of communication available to us and our society has become highly dependent on our modern, fast and accurate means of transmitting spoken messages. Usually the main aim of communicants is merely to trasmit a message as quickly, accurately and cheaply as possible. There are, however, a number of situations where the information is confidential and where an interceptor might be able to benefit immensely fromt he knowledge gained by monitoring the information circuit. In such situations the communicants must take steps to conceal and protect the content of their spoken message. Of course, the amount of protection will vary. On occasions it is sufficient to prevent a casual ‘listener’ from understanding the message but there are other times when it is crucial that even a determined interceptor must not be able to deduce ti.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

7. References

  1. Beker, H.J and Mitchell, C.J. ‘Permutations with restricted displacement’, to be submitted.

    Google Scholar 

  2. Beker, H. J. and Piper, F.C. ‘Cipher Systems: The protection of communications’, Northwood Books (1982).

    Google Scholar 

  3. Bromfield, A.J. and Mitchell, C.J. ‘Permutation selector for a sliding window time element scrambler’, to be submitted.

    Google Scholar 

  4. MacKinnon, N.R.F., ‘The development of speech encipherment’, Radio and Elect. Eng. Vol 50, No 64, 1980, 147–155.

    Google Scholar 

  5. Telsy Systems, ‘Secure Voice: Reality or myth’ (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1983 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Beker, H.J. (1983). Analogue Speech Security Systems. In: Beth, T. (eds) Cryptography. EUROCRYPT 1982. Lecture Notes in Computer Science, vol 149. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39466-4_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-39466-4_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-11993-7

  • Online ISBN: 978-3-540-39466-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics