Article
Version 1
Preserved in Portico This version is not peer-reviewed
Securing Audio Using AES-based Authenticated Encryption with Python
Version 1
: Received: 7 August 2021 / Approved: 9 August 2021 / Online: 9 August 2021 (09:31:46 CEST)
How to cite: Ayala, J. Securing Audio Using AES-based Authenticated Encryption with Python. Preprints 2021, 2021080185. https://doi.org/10.20944/preprints202108.0185.v1 Ayala, J. Securing Audio Using AES-based Authenticated Encryption with Python. Preprints 2021, 2021080185. https://doi.org/10.20944/preprints202108.0185.v1
Abstract
The focus of this research is to analyze the results of encrypting audio using various authenticated encryption algorithms implemented in the Python cryptography library for ensuring authenticity and confidentiality of the original contents. The Advanced Encryption Standard (AES) is used as the underlying cryptographic primitive in conjunction with various modes including Galois Counter Mode (GCM), Counter with Cipher Block Chaining Message Authentication Code (CCM), and Cipher Block Chaining (CBC) with Keyed-Hashing for encrypting a relatively small audio file. The resulting encrypted audio shows similarity in the variance when encrypting using AES-GCM and AES-CCM. There is a noticeable reduction in variance of the performed encodings and an increase in the amount of time it takes to encrypt and decrypt the same audio file using AES-CBC with Keyed-Hashing. In addition, the corresponding encrypted using this mode audio spans a longer duration. As a result, AES should either have GCM or CCM for an efficient and reliable authenticated encryption integration within a workflow.
Keywords
AES; Audio analysis; Authenticated encryption; Cryptography; Python
Subject
Computer Science and Mathematics, Computer Science
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment