Voice and data encryption via telephone lines
Most existing security systems for transmission of voice or data are made independent of each other. Scrambler-descrambler circuits that are analog in nature are made for the telephone, while datacryptors are made for digital systems.The purpose of this project is to design and implement an exclusiv...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
1992
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/8642 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
id |
oai:animorepository.dlsu.edu.ph:etd_bachelors-9287 |
---|---|
record_format |
eprints |
spelling |
oai:animorepository.dlsu.edu.ph:etd_bachelors-92872021-08-25T07:35:20Z Voice and data encryption via telephone lines Francisco, Daisy B. Handog, Christopher Q. Montesines, Analene A. Nagayo, Sydney P. Reyes, Frederick P. Most existing security systems for transmission of voice or data are made independent of each other. Scrambler-descrambler circuits that are analog in nature are made for the telephone, while datacryptors are made for digital systems.The purpose of this project is to design and implement an exclusive security system for both voice and data transmissions. Several techniques for fulfilling such are available, however, it was found necessary to make use of the following coding schemes: encryption/decryption techniques such as blocking, transposition, substitution, expansion, compaction of data, and the use of a pseudorandom sequence generator. These methods were chosen to ensure data security.The system will transform the data into various forms there-by concealing its original identity and preventing eavesdroppers from actually determining the intended message to be sent.The system will also operate on a half duplex mode such that the encryption stage transmits the data while its corresponding decryption stage receives it. Thus, both encryption and decryption stages are needed to satisfy the whole communications system.The medium of transmission would be the telephone lines, requiring the use of a modem (modulator/demodulator) for the medium to discern data of digital form. 1992-01-01T08:00:00Z text https://animorepository.dlsu.edu.ph/etd_bachelors/8642 Bachelor's Theses English Animo Repository Voice Telephone lines Electronic data processing Digital communications |
institution |
De La Salle University |
building |
De La Salle University Library |
continent |
Asia |
country |
Philippines Philippines |
content_provider |
De La Salle University Library |
collection |
DLSU Institutional Repository |
language |
English |
topic |
Voice Telephone lines Electronic data processing Digital communications |
spellingShingle |
Voice Telephone lines Electronic data processing Digital communications Francisco, Daisy B. Handog, Christopher Q. Montesines, Analene A. Nagayo, Sydney P. Reyes, Frederick P. Voice and data encryption via telephone lines |
description |
Most existing security systems for transmission of voice or data are made independent of each other. Scrambler-descrambler circuits that are analog in nature are made for the telephone, while datacryptors are made for digital systems.The purpose of this project is to design and implement an exclusive security system for both voice and data transmissions. Several techniques for fulfilling such are available, however, it was found necessary to make use of the following coding schemes: encryption/decryption techniques such as blocking, transposition, substitution, expansion, compaction of data, and the use of a pseudorandom sequence generator. These methods were chosen to ensure data security.The system will transform the data into various forms there-by concealing its original identity and preventing eavesdroppers from actually determining the intended message to be sent.The system will also operate on a half duplex mode such that the encryption stage transmits the data while its corresponding decryption stage receives it. Thus, both encryption and decryption stages are needed to satisfy the whole communications system.The medium of transmission would be the telephone lines, requiring the use of a modem (modulator/demodulator) for the medium to discern data of digital form. |
format |
text |
author |
Francisco, Daisy B. Handog, Christopher Q. Montesines, Analene A. Nagayo, Sydney P. Reyes, Frederick P. |
author_facet |
Francisco, Daisy B. Handog, Christopher Q. Montesines, Analene A. Nagayo, Sydney P. Reyes, Frederick P. |
author_sort |
Francisco, Daisy B. |
title |
Voice and data encryption via telephone lines |
title_short |
Voice and data encryption via telephone lines |
title_full |
Voice and data encryption via telephone lines |
title_fullStr |
Voice and data encryption via telephone lines |
title_full_unstemmed |
Voice and data encryption via telephone lines |
title_sort |
voice and data encryption via telephone lines |
publisher |
Animo Repository |
publishDate |
1992 |
url |
https://animorepository.dlsu.edu.ph/etd_bachelors/8642 |
_version_ |
1772834805087469568 |