Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Securing Audio Using AES-based Authenticated Encryption with Python

Version 1 : Received: 7 August 2021 / Approved: 9 August 2021 / Online: 9 August 2021 (09:31:46 CEST)

How to cite: Ayala, J. Securing Audio Using AES-based Authenticated Encryption with Python. Preprints 2021, 2021080185 (doi: 10.20944/preprints202108.0185.v1). Ayala, J. Securing Audio Using AES-based Authenticated Encryption with Python. Preprints 2021, 2021080185 (doi: 10.20944/preprints202108.0185.v1).

Abstract

The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.

Keywords

AES; Audio analysis; Authenticated encryption; Cryptography; Python

Subject

MATHEMATICS & COMPUTER SCIENCE, Other

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.