{"title":"一种基于服务器的语音情况下自动密码分析的ASR方法","authors":"L. A. Khan, M. S. Baig","doi":"10.1109/IAS.2008.14","DOIUrl":null,"url":null,"abstract":"Keystream reuse in stream ciphers in case of textual data has been the focus of cryptanalysis for quite some time. The first ever use of hidden Markov models based speech recognition approach to cryptanalysis of encrypted digitized speech signals in a keystream reuse situation was presented by us in [1]. In this paper, we extend the idea presented in [1] and show the applicability of different speech recognition architectures in mobile environment to automatically recover the digitized speech signals encrypted under the same keystream. The server based automatic speech recognition (ASR) approach and its associated architectures are adapted to make them applicable in our attack. The two main implementation architectures of network speech recognition (NSR) from the acoustic front-end point of view are compared with respect to automated cryptanalysis of the two time pads of stream ciphered digitized speech. The simulation experiments performed on conventional speech recognition tools are presented for both the NSR architectures.","PeriodicalId":103328,"journal":{"name":"2008 The Fourth International Conference on Information Assurance and Security","volume":"171 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech\",\"authors\":\"L. A. Khan, M. S. Baig\",\"doi\":\"10.1109/IAS.2008.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Keystream reuse in stream ciphers in case of textual data has been the focus of cryptanalysis for quite some time. The first ever use of hidden Markov models based speech recognition approach to cryptanalysis of encrypted digitized speech signals in a keystream reuse situation was presented by us in [1]. In this paper, we extend the idea presented in [1] and show the applicability of different speech recognition architectures in mobile environment to automatically recover the digitized speech signals encrypted under the same keystream. The server based automatic speech recognition (ASR) approach and its associated architectures are adapted to make them applicable in our attack. The two main implementation architectures of network speech recognition (NSR) from the acoustic front-end point of view are compared with respect to automated cryptanalysis of the two time pads of stream ciphered digitized speech. The simulation experiments performed on conventional speech recognition tools are presented for both the NSR architectures.\",\"PeriodicalId\":103328,\"journal\":{\"name\":\"2008 The Fourth International Conference on Information Assurance and Security\",\"volume\":\"171 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The Fourth International Conference on Information Assurance and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAS.2008.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2008.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech
Keystream reuse in stream ciphers in case of textual data has been the focus of cryptanalysis for quite some time. The first ever use of hidden Markov models based speech recognition approach to cryptanalysis of encrypted digitized speech signals in a keystream reuse situation was presented by us in [1]. In this paper, we extend the idea presented in [1] and show the applicability of different speech recognition architectures in mobile environment to automatically recover the digitized speech signals encrypted under the same keystream. The server based automatic speech recognition (ASR) approach and its associated architectures are adapted to make them applicable in our attack. The two main implementation architectures of network speech recognition (NSR) from the acoustic front-end point of view are compared with respect to automated cryptanalysis of the two time pads of stream ciphered digitized speech. The simulation experiments performed on conventional speech recognition tools are presented for both the NSR architectures.