• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Library for Encrypting Voice?

 
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Hi

Does anybody know about simple library that I can use it for encrypting and decrypting voice files?

Thank you.
 
Ranch Hand
Posts: 1282
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
That would be as Henry advised in intermediate. Google for Java Crypto, let us know when you get stuck.
 
Rancher
Posts: 4803
7
Mac OS X VI Editor Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
voice is just data. First you have to record the sound, get the data, get the bytes, apply your favorite cipher, and convert the enciphered bytes to some format to store.

To play back, reverse.

The java crypto code is simple, for a crypto library. None of this stuff is very simple or approachable.

Key management is the hard part, but first you should get the basics down
 
Nicholas Jordan
Ranch Hand
Posts: 1282
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Pat, it's a student project:

https://coderanch.com/t/385406/java/java/Voice-encryption-decryption-java

Poster, Pat knows what he's doing.

It all gets down to key control. You can look at the full range of emoticons provided for posting as well as add a few others to get some idea of what key control is about.

Unfortunately, to get there takes some intense study ... Start with

http://java.sun.com/j2se/1.4.2/docs/guide/security/CryptoSpec.html

The Java Cryptography Extension (JCE) extends the JCA API to include APIs ... The Java Cryptography Architecture (JCA) was designed around these principles: ...
[ May 11, 2008: Message edited by: Nicholas Jordan ]
 
Pat Farrell
Rancher
Posts: 4803
7
Mac OS X VI Editor Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
As a student project, the rules are a lot easier to deal with.

First, make sure you can record voice and store the data, at least to a disk file. And can play it back.

Get that working first.

Then you can 'encipher' it by XOR with a trivial passphrase. Store that, and play it back.

Then, and only then, add the real crypto layer as Henry and others have pointed.

The key to remember is that a crypto API takes stuff and makes it look like random garbage. It does this when it works right, and when it works wrong.
If you don't have everything else working, you will never be able to tell what is the cause of your bugs.

Its fairly easy to get things a little bit wrong, and if you are lucky, you won't be able to decihper it. If you are unlucky, you will deploy it, and later someone else will find that its trivial to break.

For a student project, you don't have to worry too much about that.
 
abu alfouz
Ranch Hand
Posts: 44
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Thank you.
 
With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime.
reply
    Bookmark Topic Watch Topic
  • New Topic