-
公开(公告)号:JP2000031941A
公开(公告)日:2000-01-28
申请号:JP16759799
申请日:1999-06-15
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04K1/02 , G09C1/00
Abstract: PROBLEM TO BE SOLVED: To obtain a voice processor architecture which does not have to use an external cipher synchronous input, has minimum voice deterioration and also accomplishes improved confidentiality by including a block eneryptor (enciphering device) and a key (key) stream generator in a transmitter side and enciphering a voice bit that is encoded by it. SOLUTION: A class 1A bit (1st block) is supplied as an input to a block encryptor (enciphering device) 34 from a voice coder (encoder) 32 included in a transmitter 30, a class 1B bit (2nd block) is supplied as an input to an XOR operator 38 and a class 2B bit (3rd block) is supplied as an input to an XOR operator 40. The encryptor (enciphering device) 34 enciphers (encrypts) a plaintext of a block into a cipher text by using an inversely transformable encryption algorithm having a key (key) related to an intended receiver.
-
公开(公告)号:DE69916931D1
公开(公告)日:2004-06-09
申请号:DE69916931
申请日:1999-06-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:DE69916931T2
公开(公告)日:2005-04-28
申请号:DE69916931
申请日:1999-06-08
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:CA2270081C
公开(公告)日:2002-12-17
申请号:CA2270081
申请日:1999-04-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: YOUTKUS DONALD JOSEPH , RANCE ROBERT JOHN , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , BERENZWEIG ADAM L , FALCO STEVEN ANTHONY
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04L9/18 , G10L3/00 , H04L1/00
Abstract: The present invention is an encrypting speech processor architecture th at provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a black encryptor (34) an d a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34) . The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block (FIG. 2).
-
公开(公告)号:BR9914229A
公开(公告)日:2001-07-31
申请号:BR9914229
申请日:1999-06-09
Applicant: LUCENT TECHNOLOGIES INC
Inventor: BERENZWEIG ADAM L , MIZIKOVSKY SEMYON B , RANCE ROBERT JOHN , FALCO STEVEN ANTHONY , PEKRUL WINSTON EDWARD , YOUTKUS DONALD JOSEPH
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a block encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block.
-
公开(公告)号:CA2270081A1
公开(公告)日:1999-12-15
申请号:CA2270081
申请日:1999-04-22
Applicant: LUCENT TECHNOLOGIES INC
Inventor: YOUTKUS DONALD JOSEPH , FALCO STEVEN ANTHONY , MIZIKOVSKY SEMYON B , PEKRUL WINSTON EDWARD , RANCE ROBERT JOHN , BERENZWEIG ADAM L
IPC: G10L19/00 , H04K1/00 , H04L9/06 , H04L9/12 , H04L9/20 , H04L9/26 , H04Q7/38 , H04L9/18 , G10L3/00 , H04L1/00
Abstract: The present invention is an encrypting speech processor architecture that provides enhanced security without the use of external cryptosync and with minimal speech degradation. This is accomplished by incorporating a black encryptor (34) and a keystream generator (36) (instead of a fixed secret mask encryption scheme, such as those implemented in voice ciphers) for encrypting blocks of encoded speech bits at a transmitter side. The block encryptor (34) employs an invertible cryptographic algorithm and internal cryptosync to convert a first block of encoded speech bits into a first ciphertext block (output 34). The first ciphertext block (output 34) is used to generate a keystream (output 36), which is then used to encrypt a second ciphertext block (FIG. 2).
-
公开(公告)号:WO2008036246B1
公开(公告)日:2008-05-08
申请号:PCT/US2007020162
申请日:2007-09-18
Applicant: LUCENT TECHNOLOGIES INC , CAO BINSHI , KIM DOH-SUK , TARRAF AHMED A , YOUTKUS DONALD JOSEPH
Inventor: CAO BINSHI , KIM DOH-SUK , TARRAF AHMED A , YOUTKUS DONALD JOSEPH
CPC classification number: G10L19/083 , G10L2021/02082
Abstract: In a method for echo suppression or cancellation, a reference voice packet is selected from a plurality of reference voice packets based on at least one encoded voice parameter associated with each of the plurality of reference voice packets and the targeted voice packet. Echo in the targeted packet is suppressed or cancelled based on the selected reference voice packet.
Abstract translation: 在用于回声抑制或消除的方法中,基于与多个参考语音分组中的每一个相关联的至少一个编码语音参数和目标语音分组,从多个参考语音分组中选择参考语音分组。 基于所选择的参考语音分组来抑制或取消目标分组中的回声。
-
-
-
-
-
-