Skip to main content

A Hidden Markov Model based Speech Recognition Approach to Automated Cryptanalysis of Two Time Pads

  • Chapter
Advances in Computational Algorithms and Data Analysis

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 14))

  • 1433 Accesses

Although keystream reuse in stream ciphers and one time pads has been a well known problem in stream ciphers for several decades, yet the threat to real systems has still been underestimated. The keystream reuse in case of textual data has been the focus of cryptanalysts for quite some time now. In this chapter, we present the use of hidden Markov models based speech recognition approach to cryptanaly-sis of encrypted digitized speech signals in a keystream reuse situation, also known as the two time pad. We show that how an adversary can automatically recover the digitized speech signals encrypted under the same keystream provided the language (e.g. English) and digital encoding scheme (e.g. linear predictive coding) of the underlying speech signals are known. The technique is flexible enough to incorporate all modern speech coding schemes and all languages for which the speech recognition techniques exist. The technique is simple and efficient and can be practically employed with the existing HMM based probabilistic speech recognition techniques with some modification in the training (pre-computation) and/or the maximum likelihood decoding procedure. The simulation experiments showed promising initial results by recognizing around 80% correct phoneme pairs encrypted by the same keystream.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shannon, C.E., A mathematical theory of communication. Bell System Technical Journal, 27, 379–423, July, 1948

    MATH  MathSciNet  Google Scholar 

  2. Mason, J., Watkins, K., Eisner, J., and Stubblefield, A., A natural language approach to automated cryptanalysis of two time pads. In 13th ACM Conference on Computer and Communications Security, November, 2006, Alexandria, Virginia, USA

    Google Scholar 

  3. Wu, H., The misuse of RC4 in Microsoft Word and Excel, Cryptology ePrint Archive, Report 2005/007, 2005. http://eprint.iacr.org.

  4. Borisov, N., Goldberg, I., and Wagner, D., Intercepting mobile communications: The insecurity of 802.11, MOBICOM 2001, 2001

    Google Scholar 

  5. Kohno, T., Attacking and repairing the WinZip encryption scheme, In 11th ACM Conference on Computer and Communications Security, pp. 72–81, October, 2004

    Google Scholar 

  6. Schneier, B., Mudge, B., and Wagner, D., Cryptanalysis of Microsoft PPTP Authentication Extensions (ms-chapv2). CQRE'99, 1999

    Google Scholar 

  7. Rabiner, L.R., A tutorial on hidden Markov models and selected applications in speech recognition, Proceedings of the IEEE, 77(2), 257–286, February, 1989

    Article  Google Scholar 

  8. Raj, B., Migdal, J., and Singh, R., Distributed speech recognition with codec parameters, IEEE Automatic Speech Recognition and Understanding 2001, Cambridge, MA, USA, December, 2001

    Google Scholar 

  9. Gales, M.J.F., Jia, B., Liu, X., Sim, K.C., Woodland, P.C., and Yu, K., Development of the CUHTK 2004 RT04F Mandarin conversational telephone speech transcription system. Proceedings of ICASSP 2005, I, 841–844, March, 2005

    Google Scholar 

  10. Benson, R.L. and Warner, M., VENONA: Soviet espionage and the American response 1939–1957. Central Intelligence Agency, Washington, DC, 1996

    Google Scholar 

  11. Wright, P., Spy Catcher. Viking, New York, NY,1987

    Google Scholar 

  12. Rubin, R., Computer methods for decrypting random stream ciphers. Cryptologia, 2(3), 215–231, July, 1978

    Article  Google Scholar 

  13. Dawson, E. and Nielsen, L., Automated cryptanalysis of XOR plaintext strings. Cryptologia, 20(2), 165–181, April, 1996

    Article  MATH  Google Scholar 

  14. Goldburg, B., Dawson, E., and Sridharan, S., The automated cryptanalysis of analog speech scramblers, EUROCRYPT'91, Springer LNCS 457, pp. 422, Germany, April, 1991

    Google Scholar 

  15. Carmen P.M., Ascension G.A., Diego F.G.C., and Fernando D.M., A comparison of front-ends for bitstream-based ASR over IP, Signal Processing, 86, 2006

    Google Scholar 

  16. Choi, S.H., Kim, H.K., and Lee, H.S., Speech recognition using quantized LSP parameters and their transformations in digital communications, Speech Communication, April, 2000

    Google Scholar 

  17. Kim, H.K., Cox, R.V. and Rose, R.C., Performance improvement of a bitstream-based front-end for wireless speech recognition in adverse environments, IEEE Transactions on Speech and Audio Processing, August, 2002

    Google Scholar 

  18. Narayanan, A. and Shmatikov, V., Fast dictionary attacks on human-memorable passwords using time-space trade-off. In 12th ACM Conference on Computer and Communications Security, pp. 364–372, Washington, DC, November, 2005

    Google Scholar 

  19. Song, D.X., Wagner, D., and Tian, X., Timing analysis of keystrokes and timing attack on SSH. In 10th USENIX Security Symposium, Washington, D.C., USA, August, 2001

    Google Scholar 

  20. Lee, D., Substitution deciphering based on HMMs with application to compressed document processing. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(12), 1661– 1666, December, 2002

    Article  Google Scholar 

  21. Zhuang, L., Zhou, F., and Tygar, J.D., Keyboard acoustic emanations revisited. In 12th ACM Conference on Computer and Communications Security, pp. 373–382, Washington, DC, November, 2005

    Google Scholar 

  22. Karlof, C. and Wagner, D., Hidden markov models cryptanalysis. Cryptographic Hardware and Embedded Systems — CHES03, Springer LNCS 2779, pp. 17–34, 2003

    Google Scholar 

  23. Young, S.J., Evermann, G., Hain, T., Kershaw, D., Moore, G.L., Odell, J. J., Ollason, D., Povey, D., Valtchev, V., and Woodland, P.C., The HTK Book. Cambridge University, Cambridge, 2003. http://htk.eng.cam.ac.uk.

  24. Godfrey, J.J., Holliman, E.C., and McDaniel J., SWITCHBOARD: Telephone speech corpus for research and development, Proceedings of ICASSP, San Francisco, 1992

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media B.V

About this chapter

Cite this chapter

Khan, L.A., Baig, M.S. (2009). A Hidden Markov Model based Speech Recognition Approach to Automated Cryptanalysis of Two Time Pads. In: Ao, SI., Rieger, B., Chen, SS. (eds) Advances in Computational Algorithms and Data Analysis. Lecture Notes in Electrical Engineering, vol 14. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8919-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8919-0_12

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8918-3

  • Online ISBN: 978-1-4020-8919-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics