Abstract

With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. In this contest there is an increasing demand for successful storage of the data in the encrypted domain to avoid the possibility of data breach in shared networks. In this paper, a novel approach for speech encryption algorithm based on quantum chaotic system is designed. In the proposed method, classical bits of the speech samples are initially encoded in nonorthogonal quantum state by the secret polarizing angle. In the quantum domain, encoded speech samples are subjected to bit-flip operation according to the Controlled–NOT gate followed by Hadamard transform. Complete superposition of the quantum state in both Hadamard and standard basis is achieved through Hadamard transform. Control bits for C-NOT gate as well as Hadamard gate are generated with a modified -hyperchaotic system. Secret nonorthogonal rotation angles and initial conditions of the hyperchaotic system are the keys used to ensure the security of the proposed algorithm. The computational complexity of the proposed algorithm has been analysed both in quantum domain and classical domain. Numerical simulation carried out based on the above principle showed that the proposed speech encryption algorithm has wider keyspace, higher key sensitivity and robust against various differential and statistical cryptographic attacks.

1. Introduction

1.1. Background

Speech encryption techniques have been widely used in confidential areas such as defence, voice over IP, voice-conferencing, news telecasting, e-commerce etc. In these applications, Integrity protection of the voice data is the major security concern, which demands the development of secure speech cryptographic algorithms. Classical data encryption methods are poorly suited for audio encryption, due to its bulky data capacity, strong correlation between adjacent data samples and the presence of unvoiced data segments. Furthermore, there is no theoretical limit on cloning or copying of data in classical cryptography. Quantum information processing is one of the promising fields of cryptography, in which the fundamental principles of quantum mechanics like Heisenberg uncertainty principle and principle of photon polarization are directly exploited [1]. Any attempt made by an intruder to clone or copy an unknown quantum state will destroy the state and it will be detected [2]. Furthermore, nonorthogonal quantum states cannot be readily distinguished even if the states are known. Quantum cryptography was developed in 1984 by the physicist Charles Henry Bennett and it was experimentally demonstrated in 1992 [3]. In 1982, Richard Feynman introduced the idea of a quantum computer, which uses the basic principles of quantum mechanics to its advantage [4]. Quantum computational model theoretically has high computational power to solve realtime mathematical problems much faster than classical computers [5, 6]. With the development in this field, computationally efficient quantum algorithms like Shores factoring algorithm, Grover’s searching algorithm and discrete algorithm have been designed which may threaten classical cryptosystem [6]. Also, quantum signal processing outperforms classical signal processing since quantum Fourier transform [7], quantum discrete cosine transform [8, 9] and quantum wavelet transforms [10] are more efficient than their classical counterparts. Thus, cryptanalysts have to design new algorithms according to the principle of quantum mechanics to protect classical information.

Chaos is another elucidating theory from the field of nonlinear dynamics, which has potential applications in several functional areas of a digital system such as compression, encryption, and modulation. It is one of the subtle behaviours associated with the evolution of a nonlinear physical system with significant properties such as topological transitivity, aperiodicity, deterministic pseudo randomness, and sensitive dependence on initial conditions [11]. The complex chaos theory have been utilized in many conventional cryptographic approaches like RC5 stream cipher and elliptical curve cryptography to strengthen the security of encryption processes [12, 13]. Cryptographic algorithms based on chaos theory consist of two operations such as permutation and diffusion. In the permutation process data samples in the plaintext is rearranged to destroy the local correlation, making the data unable to understand. While in the diffusion stage data sample is masked by the pseudorandom number generated with the chaotic systems to change the sample values. Amin and Abd El-Latif [14] proposed a secret sharing algorithm, which combines random grids (RG), error diffusion (ED) and chaotic permutation to improve the security. Gopalakrihnan and Ramakrishnan [15] introduced an image encryption algorithm where they adopted multiple chaotic systems such as Logistic-Tent Map (LTM), Logistic-Sin Map (LSM), and Tent-Sin Map (TSM) for intermediate chaotic keystream generation. The reproducibility and deterministic nature of chaotic functions add value to cryptographic processes since the process can be repeated for the same function and same initial conditions. These properties improve the security of the cryptographic process by multiple iterations of chaotic maps based on substitution and diffusion operations [16, 17]. Moreover, S–box generation mechanism based on chaotic function along with substitution and permutation process increases the complexity of the algorithm, consequentially enhances the security [18, 19]. Wang et al. [20] proposed a dynamic keystream selection mechanism for box generation, which avoids the possibility of the chosen plain text and chosen ciphertext attacks. Data encryption techniques based on a lower dimensional chaotic system have weak resistance to brute force attack, which cannot ensure the security of data due to the small keyspace. To improve the keyspace most of the chaos-based encryption algorithms tend to take advantage of combining more than one chaotic system, but it increases the computational complexity, system resources and time. Consequently, encryption techniques based on hyperchaotic systems have been introduced [2123]. These systems have more than one positive Lyapunov exponent and rich complex dynamic behaviour. Nonlinear dynamics and fractional order dynamical systems have been widely studied in recent years. Synchronization of fractional order complex dynamical systems has potential applications in secure communication systems. Sheue [24] proposed a speech encryption algorithm based on fractional order chaotic systems. It is based on two-channel transmission method where the original speech is encoded using a nonlinear function of the Lorenz chaotic system. They also, analysed the conditions for synchronization between fractional chaotic systems theoretically by using the Laplace transform.

1.2. Review of Related Works

Quantitative modelling and finite precision realization of nonlinear phenomenon could be easily realized with the development of quantum computational models. Therefore researchers have attempted to combine two fundamental theories of physics like deterministic chaos and probabilistic quantum dynamics to develop new cryptographic algorithms. Vidal et al., introduced an encryption technique, which attributes rich dynamics of hyperchaotic system and some fundamental properties of quantum cryptography [25]. Arnold Cat transform is applied widely as a permutation matrix in several quantum data encryption algorithm [2629]. Abd El-Latif et al., [26] proposed an image encryption algorithm method where he utilized the concept of toral automorphism, low frequency -luminance subband scrambling and quantum chaotic map. In this method discretized quantum chaotic Cat map is employed for substitution by generating an intermediate chaotic key stream. Jiang et al., proposed a quantum image scrambling circuit based on Arnold and Fibonacci transformation [27]. Zhou et al., proposed an algorithm based on double phase random coding and generalized Arnold transform [28], in which image pixels are permuted by the Arnold transform and grey level information is encrypted by the double random-phase process. Akhshani et al., studied the nature of dissipative quantum systems and proposed an image encryption algorithm based on the quantum logistic map [29]. Liang et al., proposed a method, where quantum image is encrypted by XOR operation with C-NOT gate which is controlled by pseudorandom number generated by the Logistic map [30]. Gong et al., introduced an algorithm, in which Chen hyperchaotic system is utilized to control the C-NOT operation [31], where the grey level information is encoded by quantum XOR operation. Later, Li et al., [32] designed a quantum colour image encryption based on multiple discrete chaotic systems where Logistic map, Asymmetric Tent map and Logistic Chebyshev map are used to generate control bits. Recently researchers have attempted to develop quantum key distribution in chaotic regime [33, 34].

1.3. Motivation and Objective of the Present Work

Most of the proposed classical encryption methods are flawed by limited keyspace, computational complexity and weak resistance to differential attacks. However, the proposed chaotic-quantum algorithms are computationally efficient and unconditionally secure [2635]. But they fail to provide complete superposition of quantum states in encrypted domain. This paper introduces a speech encryption algorithm in the quantum scenario, where in classical bits are encoded in the nonorthogonal quantum states. Nonorthogonal quantum states are prepared by unitary rotations of the classical bits through secret rotation angles. Then, the encoded qubits are encrypted by controlled-NOT operation followed by Hadamard transform based on the key generated by the hyperchaotic system. Here quantum gates are controlled by the keystreams generated with the four dimensional hyperchaotic system proposed by Zhou and Yang [35] based on 3D Lü system. This proposed algorithm extends the security by encrypting quantum messages in both Standard and Hadamard basis. Both secret rotating angles and initial conditions of the hyperchaotic systems constitute the key, which enlarges the keyspace. The resulting algorithm ensures security against various differential and statistical attacks due to its enlarged keyspace.

The rest of this paper is organized as follows: The preliminary study of the proposed speech encryption algorithm is presented in Section 2. Theoretical framework of the proposed approach is given in Section 3. Numerical simulations and performance evaluations are discussed in Section 4. Comparison of the proposed method with other state-of-art is discussed in Section 5, followed by conclusion in Section 6.

2. Preliminary Studies

2.1. Encoding Classical Bits in Nonorthogonal Quantum States

Speech samples are mapped into quantum data media as nonorthogonal quantum state which could be in Standard or Hadamard basis. Figure 1 shows the two pairs of nonorthogonal quantum states in Standard and Hadamard basis. Unlike orthogonal quantum states, nonorthogonal quantum states cannot be discriminated deterministically. Quantum data that encode the classical bits into nonorthogonal quantum states increases the robustness against PNS (photon number splitting) attacks.

Classical bits of the speech samples are encoded in the nonorthogonal quantum state by secret polarizing angle through unitary rotations. Classical binary bit to be encoded in quantum state is . Sender encodes the classical bits by choosing nonorthogonal angle randomly between . The rotation operator operates on classical bits results the nonorthogonal quantum states . Tensor product generates the superposition states corresponding to

The rotation operator in matrix form is expressed by:

In order to retrieve the classical data, the receiver has to rotate the quantum bit by the secret angle in the opposite direction. The rotation operator is unitary since =, where is the adjoint of the matrix and is the identity matrix

Quantum states corresponding to each classical bit can be expressed as follows:

where is the quantum state corresponding to classical bits for the secret rotation angle . Tensor product between the quantum states refer to (3) generate the superposition states given as in (4):

Here the qubit quantum system , exist as the superposition of states with equal probability.

Superposition states for a three qubit quantum system is described as follows:

2.2. Quantum Gates

Quantum gates are the basic tool for quantum information processing. It can be represented as unitary matrix of size , if the quantum logic gates acts on a qubit quantum system. A suitable network of quantum gates can process quantum information much faster than the corresponding classical networks. In the proposed algorithm, quantum gates like Controlled-NOT (C-NOT) gates and Hadamard gates are used.

2.2.1. Controlled-NOT Gate

Controlled-NOT (C-NOT) is the classical counter part of XOR gate. It has two input bits, one control bit and one target bit. If the control bit is set to , the gate flips the target qubit. If the control bit is set to target qubit remains same. Mathematical expression of the Controlled-NOT gate can be given as follows:

is the matrix form of CNOT gate, where .

2.2.2. Hadamard Gate

In Hadamard basis qubit can be represented as , which gives the sense of complete superposition between ground state and excited state .

Hadamard gate operation on single qubit operation is given by:

where

General operation of Hadamard gate on target qubits, which is both in Standard and Hadamard basis are as follows:

2.3. Hyperchaotic System

To improve keyspace and security, hyperchaotic systems are widely used in data encryption systems. In the proposed algorithm, keystream for the encryption process is generated from the 4-D hyperchaotic system discovered by Zhou and Yang by the fourth order Runge-Kutta method. The system is described as follows:

It has infinite number of real equilibrium. The system (12) shows multiple dynamic behaviour over a wide range of control parameter . The evolution of chaotic dynamics such as periodic, quasi periodic and chaotic attractors in this system can be obtained by varying control parameter [0, 25] by fixing all other parameters constant. When the system generates hyperchaotic attractor and this region is utilized for encryption purpose. The encryption process in higher dimensional space eliminates periodic window problems such as limited chaotic range and nonuniform distribution. Figure 2 illustrates the bifurcation diagram of modified system.

3. Proposed Algorithm

3.1. Encryption Process

In this section we systematically demonstrate the various steps in encryption process. Figure 3 illustrates the proposed algorithm.

Step 1. Set the values for initial conditions and system parameter for the hyperchaotic system. Generate four different hyperchaotic sequences by iterating the hyperchaotic system by Runge-Kutta method for .
The generated sequences are .

Step 2. Convert the four hyperchaotic sequences into integer sequences as follows:

Step 3. Generate keystream as control bits for C-NOT operation and Hadamard operation.

Control bits for CNOT operation is given by:

Control bits for Hadamard transform is given by:

Step 4. Controlled NOT gate perform bit flip operation on quantum speech sample according to the control bits .Where is realized from keystream generated with hyperchaotic sequence. Construct a C-NOT operator as follows:

where is the bit flip operator, that operates on the quantum state according to the control bit resulting into new state .

Table 1, describe the whole possible quantum states for three qubit system and its C-NOT transformations.

Step 5. Hadamard gate operates on after the bit flip operation performed by Controlled-NOT gate. In this operation is the control bit and it is realized from keystream generated with the hyperchaotic system. Hadamard gate operates on the target qubit only when the control qubit is or else the target qubit remains the same.

Controlled Hadamard gate operator is given by:

Hadamard gate for the qubit operation

Apply Hadamard gate under the control of key element

where is the density matrix for the quantum state , . Hadamard transformation for three qubit system is given in Table 2.

Detailed encryption process for a four qubit quantum system with fixed and is given in Table 3.

3.2. Decryption Process

The procedure of decryption process is reverse of the encryption process. Since rotation operator , C-NOT gate and H-gate are unitary operators, decryption can be done easily by means of the pre-shared keys. The decryption process is described as follows:

Step 1. Generate the same keystream or control bits and according to the steps 1–3 in encryption process.

Step 2. Perform Hadamard operation on .
; Since

Step 3. Perform Controlled –NOT operation on

Step 4. Do the inverse rotation operation on to retrieve the classical data.

4. Numerical Simulation and Results

The proposed algorithm is realized by classical counterpart of circuit elements equivalent to quantum circuit. The proposed algorithm is simulated on a classical computer with MATLAB R2013a (version) software. Eight voice samples of male and female speech signal with sampling rate of 8000 samples/sec are selected for the test. The initial conditions are set as , , , . Time step for the fourth order Runge-Kutta method is taken as 0.005.

4.1. Correlation Analysis

Correlation analysis is a statistical metric to evaluate the performance of cryptographic algorithm over various statistical attacks. Correlation coefficient analysis measures the mutual relationship between similar segments in the plain audio file and the encrypted audio file. A secure data encryption algorithm converts original data into random-like noisy signal with low correlation coefficient [36]. Low correlation coefficient indicates the narrow correlation between original and encrypted speech files. Correlation coefficient is evaluated based on the equation (22) and it is tabulated in Table 4.

where and are mean and are the standard deviation of the encrypted and decrypted speech signal. Scatter plot diagram is plotted for original and encrypted version, which is shown in Figures 4(a) and 4(b) respectively. It clearly shows that the encrypted version is scattered or randomized.

4.2. Signal to Noise Ratio (SNR)

Signal to noise ratio is one of the straight forward methods to validate the performance of data encryption algorithm. SNR measures the noise content in the encrypted data signal. Cryptanalyst always try to increase the noise content in the encrypted signal so as to minimize the information content in the encrypted data [37]. Figure 5 displays the original and encrypted speech signal. It is clear that encrypted speech signal contains more noise content that in original speech signal. The SNR values of encrypted audio files are calculated based on the following equation (23) and it is given in Table 4.

4.3. Percent Residual Deviation (PRD)

Percentage Residual Deviation is another statistical tool to measure the variation of the encrypted speech signal from original signal. PRD can be calculated for the given plain audio signal and encrypted signal as follows:

The calculated values of the percent residual deviation for various original and encrypted speech signals are given in Table 4. It can be seen that the encrypted signal is highly deviated from its original signal.

4.4. Spectral Entropy

Spectral entropy measures the randomness in both encrypted and original speech signal. Its measurement is based on the assumption that the spectrum of meaningful speech segment is correlated than the noisy signal. The spectral measurement compares the entropy where the amplitude component of the power spectrum is taken as a probability parameter in entropy calculation. The amount of information can be calculated as the negative of entropy or the negative logarithm of probability. Thus, meaningful speech segments shows low entropy since it contains organized data samples. However the encrypted speech signals have high entropy and large spectral peaks similar to noisy signal. The entropy can be measured as follows:

where is the normalized power spectrum and is the frequency of the signal. Irregularities of amplitude in original and encrypted signals are shown in Figure 6.

4.5. Keyspace and Key Sensitivity Analysis

The secret rotation angles and initial conditions and system parameter () of the hyperchaotic system determine the keyspace. In the recommended algorithm, floating point accuracy of 10–16is used for the key components. Therefore the keyspace achieved in this scheme is in classical computation. But in the quantum domain the keyspace exist as the superposition of quantum states, which is large enough to break various cryptographic attacks.

Key sensitivity is the essential quality for any good data encryption algorithm, which make sure that the security level of the algorithm against the brute-force attack. It means that a small variation for any key parameters bring an apparent change in both encrypted and decrypted speech signal. The effect of variation in keyparameter on encryption process is verified by encrypting the signal with slightly different initial conditions. The simulation result shows that the slight variation in keyparameter will result completely different encrypted signal. Figure 7 shows the encrypted signals with two different initial conditions. To evaluate the key sensitivity of decrypted signal, encrypt the speech file with one fixed secret key then decryption is performed with slightly different keys. The resulting speech files decrypted with wrong keys apparently looks different and reveals no information.

Figure 8(a) shows the decrypted speech signal with correct key. Figures 8(b)8(e) show the decrypted signal with slight variations in the initial conditions.

4.6. UACI and NSCR Analysis

In data encryption process, resistace to differential attacks is generally analyzed through NSCR (number of samples change rate) and UACI (unified average changing intensity) tests. In this analyysis two different speech segments are encrypted with same keystreams,where the original speech segments are differed by one sample space [38]. Then the encrypted speeech segments are compared by the number of sample change rate (NSCR) and the unified average changing intensity (UACI). Both these prameters can be expressed as follows:

where

and denotes the the audio samles at position of the encrypted speech samples and corresponds to the length of the speech segments.The upper-bound for NSCR and UACI are 100% and 33.3% respectively. For a secure encryption scheme these parameters should be close to the upper bound ideal values.

4.7. Computational Complexity

In quantum computation, computational complexity is evaluated by the number of quantum gates employed in encryption process. In the proposed algorithm fundamental quantum gates such as C-NOT gate and Hadamard gates are utilized. Since the computational complexity of the quantum computation is parallel, complexity of the entire encryption process could be obtained by the quantum sub-operations like (C-NOT operator) and (Hadamard operator). Assume that the input speech samples are encoded in quantum domain and each sample spaces are in a superposition of quantum states. In Controlled-NOT operation, each qubit is acted upon by when =1. Quantum XOR operator or bit flip operator is realized by n-CNOT gate. In these operations each -CNOT gate can be realized by Toffoli gates and each Toffoli gate is equivalent to six Control-not gates. Therefore total elementary gates involved in quantum XOR operation is Thus, the computational complexity of the first phase of encryption with C-NOT operator is The Hadamard gate operation on qubit system is . The Hadamard gate can be realized by . Pauli and Pauli gates can be decomposed to single Toffoli gate with appropriate control signal. Therefore the basic elementary operation involved in Hadamard gate is . In the second phase of encryption process the computational complexity of Hadamard operator can be approximated to . Since both the operations scales linearly with input , the computational complexity of entire process is Comparing with classical speech encryption algorithm, the classical XOR operation could be realized with XOR operations. Therefore the computational complexity of classical encryption algorithm corresponding to its quantum version is

5. Comparison with Existing Works

The proposed algorithm is compared with existing algorithms in both quantum and classical domain. Various quality metrices such as key length, keyspace NPCR, UACI and correlation coefficient between original and encrypted signals are analysed and tabulated in Table 5.

The size of the proposed method’s key space is greater than (Section 4.5). It is clear from the simulation results (Figure 4) that the encrypted speech signal contains more noise content that in the original speech signal. Correlation coefficient (CC) evaluated is almost zero (Table 4) for the proposed algorithm. A standard Encryption Algorithm (AES), a fast colour image encryption algorithm based by hyperchaotic system [22], an algorithm based on hyperchaotic system and S boxes in the form of permutation–substitution network [23], and a colour image encryption based on quantum chaotic system [26] are taken for comparison.

6. Conclusion

In this paper, a new classical data encryption algorithm in quantum domain is proposed. The basic idea behind the security of the proposed algorithm lies in protecting the classical information in the form of nonorthogonal quantum states. Furthermore the Controlled NOT operation and Hadamard operation in quantum domain extends the security of the proposed algorithm. The introduction of modified hyperchaotic -system into quantum speech encryption algorithm increases the number of keys and improved the key sensitivity. Various simulations and numerical analysis have been carried on classical computer to evaluate the performance of the algorithm. The simulation results demonstrated that the proposed approach is an excellent choice for classical data encryption in quantum domain.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.