Next Article in Journal
Can the Solar Atmosphere Generate Very-High-Energy Cosmic Rays?
Previous Article in Journal
Perrin Numbers That Are Concatenations of a Perrin Number and a Padovan Number in Base b
Previous Article in Special Issue
Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems

by
Jelica Radomirović
1,2,*,
Milan Milosavljević
1,
Sara Čubrilović
1,2,
Zvezdana Kuzmanović
1,2,
Miroslav Perić
1,
Zoran Banjac
1 and
Dragana Perić
1
1
Vlatacom Institute of High Technology, Milutina Milankovica 5, 11070 Belgrade, Serbia
2
School of Electrical Engineering, Belgrade University, Bulevar kralja Aleksandra 73, 11120 Belgrade, Serbia
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(3), 365; https://doi.org/10.3390/sym17030365
Submission received: 9 January 2025 / Revised: 23 February 2025 / Accepted: 25 February 2025 / Published: 27 February 2025
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography, Second Edition)

Abstract

:
This paper presents an autonomous perfectly secure low-bit-rate voice communication system (APS-VCS) based on the mixed-excitation linear prediction voice coder (MELPe), Vernam cipher, and sequential key distillation (SKD) protocol by public discussion. An authenticated public channel can be selected in a wide range, from internet connections to specially leased radio channels. We found the source of common randomness between the locally synthesized speech signal at the transmitter and the reconstructed speech signal at the receiver side. To avoid information leakage about open input speech, the SKD protocol is not executed on the actual transmitted speech signal but on artificially synthesized speech obtained by random selection of the linear spectral pairs (LSP) parameters of the speech production model. Experimental verification of the proposed system was performed on the Vlatacom Personal Crypto Platform for Voice encryption (vPCP-V). Empirical measurements show that with an adequate selection of system parameters for voice transmission of 1.2 kb/s, a secret key rate (KR) of up to 8.8 kb/s can be achieved, with a negligible leakage rate (LR) and bit error rate (BER) of order 10 3 for various communications channels, including GSM 3G and GSM VoLTE networks. At the same time, by ensuring perfect secrecy within symmetric encryption systems, it further highlights the importance of the symmetry principle in the field of information-theoretic security. To our knowledge, this is the first autonomous, perfectly secret system for low-bit-rate voice communication that does not require explicit prior generation and distribution of secret keys.

1. Introduction

In this paper, we asked the following question: Is it possible to design an autonomous, perfectly secret speech communication system whose integral part is the subsystem for the generation and distribution of the required amount of secret keys in real time?
As is known [1], the Vernam cipher [2] or One-Time-Pad (OTP) [3] satisfies the condition of perfect secrecy, and the price to be paid is that the secret key rate is equal to the message rate. The need for secret keys decreases proportionally with the message rate, justifying the use of low-bit-rate voice coders in practical implementations [4,5,6]. However, the problem of efficient generation and distribution of secret keys in the case of the Vernam cipher is still open.
While physical key distribution remains the simplest but impractical option over long distances, more modern approaches, such as quantum key distribution and the use of physical entropy sources, provide promising methods for future systems. Quantum key distribution stands out for its provably secure nature, though it requires significant infrastructure [7].
In the group of methods that use physical entropy sources, a special place is occupied by the methods of generating and distributing secret keys using sequential key distillation (SKD) protocols by public discussion [8,9,10]. Their application requires two prerequisites:
  • Sources of common randomness with sufficient capacity shared by communication parties (Alice, Bob)
  • An additional authenticated communication channel of appropriate capacity, which may be public, and which is assumed to be wiretapped by an attacker (Eve).
By far, most solutions in this category take the wireless channel itself as a physical source of common randomness [11,12,13]. However, we exclude this approach due to our requirement for system autonomy, which implies independence from the used communication channel. A small number of remaining papers are dominantly related to various biometric signals as sources of common randomness [14,15,16]. However, there are no solutions that would be based on common randomness sources independent of the used telecommunication channels while guaranteeing the secret key generation speed equal to low-bit-rate vocoder speeds of 1.2 kb/s or 2.4 kb/s.
While most existing works investigate key generation protocols in a particular environment, very few of them focus on the joint design of key generation and OTP. A straightforward way is cascading or parallel key generation and OTP, but more complex constructions appear in the literature. For example, in [17], it was proved that using a non-reconciled key for OTP outperforms classical identical key OTP.
In the first step of the proposed system’s design, we select a standard low-bit-rate vocoder MELPe with a speed of 1.2 kb/s [5,18] and an appropriate authenticated public channel, which must be available during system operation.
In the second step, based on extensive tests of this vocoder in real working conditions within the vPCP-V system [19], we identify a source of common randomness suitable for generating and distributing secret keys at speeds far higher than 1.2 kb/s. This source consists of a locally synthesized speech signal on the transmitting side (Alice) and a corresponding synthesized signal on the receiving side (Bob). The differences between these signals come from different local sources of randomness, which are used to form the complex excitation of the MELP vocoder synthesizer. This source of shared randomness can be used in the open speech mode, which, as a rule, precedes the phase of secure voice communication. All information about input voice that flows through the public channel to Eve during the execution of the SKD protocol is of no importance since communication is also open through the main channel. However, in the phase of protected communication on the main channel, this information will significantly reduce the uncertainty of the input voice. Therefore, we introduce a new synthesizer on the Alice and Bob side for this phase, whose synthesis filters are set based on secret randomly chosen LSP parameters [18,20]. These values are available to both Alice and Bob since they are formed from previously distilled secret keys.
In this way, we obtain all the necessary conditions for the design of a perfectly secret autonomous low-bit-rate voice communication system.

1.1. Related Works

To focus on relevant research, it is essential to recall the fundamental requirements that a highly secure voice protection system must meet [21].
  • Security Requirements:
  • Strong end-to-end encryption—only legitimate parties should be able to encrypt and decrypt the communication.
  • Key management procedures must be designed in a way that does not compromise the declared security level of the system.
  • A secure key agreement must be ensured.
  • The choice of encryption algorithm and secret key length must support the proclaimed security level.
  • Functionality Requirements:
  • The system must be resistant to distortions introduced by GSM codecs, which are designed for speech transmission over mobile networks rather than encrypted speech, which is inherently a data stream.
  • Minimization of transmission error rates—this requirement is crucial for low-bit-rate vocoders. The analytical–synthetic approach of vocoders inherently reduces the quality of synthesized speech on the receiving side, meaning that additional transmission errors must be minimized.
According to the classification provided in [22], most research falls into two distinct categories:
  • Secure voice communication using modem-based cryptographic techniques
  • Secure voice communication based on chaotic cryptographic techniques
Due to the generic structure of modem-based cryptographic techniques, the vPCP-V system belongs to this category [22,23]. Therefore, our primary focus will be on this class of systems. Table 2 in ref. [22] summarizes the performance of 22 systems published up to 2022. Without exception, all solutions are based on standard cryptographic algorithms with finite secret keys (AES, RC4, TEA) and rely on conventional public key infrastructure (PKI) for key generation and distribution.
As a result, these systems do not ensure autonomy, as they depend on a Trusted Third Party (TTP), nor do they achieve perfect secrecy, since their secret key rates are far below the speech data rate they encrypt.
In [24], a practical implementation of a lightweight AES algorithm (128-bit key) in FPGA technology for peer-to-peer voice encryption was analyzed. It is evident that this work falls within the same category of non-autonomous and non-perfectly secret systems. Similarly, ref. [25] proposes a new VoIPChain system for authentication in Voice over IP using Ethereum Blockchain technology [26]. While this decentralized system overcomes many security issues associated with traditional single-server PKI infrastructures, it still requires a security infrastructure, including maintaining a shared ledger. Consequently, this system also falls under the category of non-autonomous, non-perfectly secret voice transmission systems. Furthermore, ref. [27] presents various security concepts and communication systems proposed by NATO Research Task Group IST-174, titled “Secure Underwater Communications for Heterogeneous Network-enabled Operations”. These efforts contribute to standardization in the field. Recognizing that key allocation and management remain major challenges in symmetric cryptographic systems, the study identifies SKD protocols over appropriate sources of common randomness as one of the most promising technologies, which is fully aligned with our findings. However, it is important to note that this work does not discuss the use of SKD for real-time perfectly secret systems, but only in the context of traditional non-perfect cryptographic systems.
In the category of secure voice communication based on chaotic cryptographic techniques, seven solutions published up to 2019 were analyzed in [22]. Additionally, we incorporated the latest studies [28,29,30] into this review.
Secure voice communication systems based on chaotic cryptographic techniques leverage chaotic algorithms due to their sensitivity to initial conditions and their ability to generate pseudo-randomness, both of which are essential for secure encryption. However, from the perspective of information-theoretic security, any chaotic algorithm can be considered a deterministic dynamic system fully defined by its initial states. Consequently, the equivocation of secret keys in such systems cannot exceed the length of their binary representation. Therefore, similar to classical cryptographic algorithms with finite secret keys, this class of algorithms cannot provide perfect secrecy.
Notably, no prior work has proposed a perfectly secret autonomous system where secret key generation is derived from a synthesized speech signal, independent of the telecommunication channel and without external key distribution infrastructure.

1.2. Innovation and Engineering Value

Our novel approach for autonomous, perfectly secret low-bit-rate voice communication is based on the following key innovations:
  • Artificially Synthesized Speech as a Common Randomness Source
    • Unlike natural speech, synthesized speech allows precise control over its randomness properties.
    • The proposed system uses LSP parameters of a MELPe-like synthesizer to generate shared randomness between Alice and Bob.
    • This approach eliminates the need for external entropy sources such as radio channels or biometrics.
  • Independent True Randomness for Enhanced Security
    • The LSP parameters are randomly selected, ensuring unpredictability.
    • An independent source of true randomness (e.g., from a cryptographic random number generator) ensures entropy is sufficient for perfect secrecy.
  • SKD Over a Public Authenticated Channel
    • A real-time SKD protocol is executed over an authenticated but public channel, allowing Alice and Bob to extract a mutually secret key from their synthesized speech signals.
    • The key rate achieved significantly exceeds the 1.2 kb/s or 2.4 kb/s needed for MELPe encryption, ensuring continuous perfect secrecy.
  • No Prior Key Distribution or TTP
    • The system operates autonomously without requiring prior key exchange.
    • Unlike Quantum Key Distribution (QKD) or traditional key management systems, no external infrastructure is needed.
  • Real-Time Suitability for Low-Bit-Rate Voice Encryption
    • The key generation rate is synchronized with the encryption rate of MELPe vocoders, allowing seamless one-time-pad encryption.
    • vPCP-V was used for empirical verification, demonstrating an achievable secret key rate of up to 8.8 kb/s and a BER of order 10 3 for various communications channels, including GSM 3G and GSM VoLTE networks.
Considering all of this, the proposed system meets all the fundamental security and functional requirements that a protected system must meet.

1.3. Contributions of This Work

  • A novel autonomous key generation method based on synthesized speech.
  • A low-bit-rate perfectly secret communication system combining MELPe, Vernam cipher, and real-time SKD.
  • Experimental validation of the proposed system, demonstrating its feasibility and security.
  • A discussion on the implementation challenges and scalability of the system in real-world applications.

1.4. Paper Organization

The paper is organized as follows. Section 2 presents the architecture of the proposed system. Section 3 presents an analysis of identified sources of common randomness. Section 4 describes the LSP-based linear prediction (LP) synthesizer. In Section 5, an information-theoretic analysis of the source of common randomness based on randomly selected LSP parameters is provided. Section 6 presents the new privacy amplification strategy based on the so-called Huffman–Renyi difference, which is suitable for application in APS-VCS. The experimental evaluation of the proposed system executed on the Vlatacom Personal Crypto Platform for Voice encryption is provided in Section 7, while Section 8 provides the conclusion.

2. System Architecture

A generic secret low-bit-rate speech communication system is shown in Figure 1. According to the classification provided in [22], it belongs to the category of secure voice communication using modem-based cryptographic techniques. A key aspect of the information-theoretic approach to verifying the security level of a system is the amount of information an eavesdropper can obtain about the messages based on ciphertext observations. It is well known [1] that if C K is generated using any cryptographic algorithm with a finite secret key K , its equivocation from the attacker’s perspective, H ( K | Y ) , rapidly converges to zero after a sufficiently long ciphertext observation. Practically, this means that such a system is not information-theoretically secure, and its security depends on the computational power of the adversary. Once the amount of observed ciphertext satisfies the condition H ( K | Y ) = 0 , the key K has a unique solution, meaning that, in cryptanalytic terms, the system is broken. However, if C K is a purely random sequence independent of the messages X , it can be shown that the mutual information I ( Y ; X ) = 0 . This implies that the attacker cannot retrieve the messages regardless of their computational resources, making the system perfectly secret.
We selected a standard low-bit-rate vocoder MELPe with a speed of 1.2 kb/s [5,18]. Note that the MELPe vocoder can be replaced by any other standard vocoder with similar performance. The input speech signal S is sampled at 8 kHz, discretized with 16 bits per sample, and divided into frames lasting 67.5 ms (540 samples). In the MELPe analyzer, 81 bits are generated for each input frame, of which 80 bits code 10 LSP parameters of the LP speech production model, while the 81st bit is the synchronization bit. This bit stream is encrypted by adding modulo 2 with the binary pseudorandom sequence C K generated by key stream generator KSG(K) with secret key K, which must be shared between legitimate parties before the start of communication. The ciphertext Y is transmitted over the main channel after appropriate modulation. On the receiving side, after demodulation, decryption is performed. Decryption is done by adding modulo 2 with a synchronously generated binary sequence C K on the receiving side. As a result, identical LSP parameters are obtained, which produce the reconstructed speech signal S ^ in the MELPe synthesizer block. With C R ( S ,   S ^ ), we denoted our first candidate for the source of common randomness, formed from the input speech signal S on the transmitter side and the speech signal S ^ synthesized on the receiver side; see Figure 1.
Figure 2 shows an extension of the generic scheme from Figure 1 with local MELPe synthesis on the transmitter side. C R ( S ^ l ,   S ^ ) is denoted as our second candidate for the source of common randomness, formed from the locally synthesized speech signal S ^ l on the transmitter side and the speech signal S ^ synthesized on the receiver side. If there are no transmission errors, the synthesis filters on the receiving and transmitting sides are equal, and the differences in the synthesized signals come from different local sources of randomness, which are used to form the complex excitation of the MELPe vocoder synthesizer.
As is known [9], during the execution of the SKD protocol, in the advantage distillation (AD) and information reconciliation (IR) phases, the information exchanged between Alice and Bob over the public channel is available to Eve. For example, if the bit parity (BP) protocol [31] is used in the AD phase, the number of parity bits of Alice’s sequence that are available to Eve is provided by following Lemma.
Lemma 1. 
Let the initial strings X and Y , owned by Alice and Bob at the beginning of the SKD protocol, be binary iid random sequences of length N at Hamming distance ε , ε 0 ,   0.5 . Then, the expected number of parity bits that Alice exchanges with Bob over the public channel is provided by
N A D p a r i t y = N 2 + i = 1 s 1 N 2 i + 1 · ε 2 i + 1 ε 2 i j = 0 i 1 ε 2 j + 1 ε 2 j ,
where s is the number of iterations of the BP algorithm.
Proof. 
The proof follows directly from the fact that the total amount of parity bits exchanged in the BP algorithm is equal to the sum of exchanges for each iteration. On the other hand, for each iteration, this value is equal to half the length of the sequences at the beginning of the iteration. This length is also equal to the length of the sequences at the end of the previous iteration. In [32], Theorem 2.2.3, p. 17, an expression for the compression rate of the BP algorithm in each iteration is provided. Based on this formula, we obtain the length of the sequences after i iterations i.e., N 2 i + 1 · ε 2 i + 1 ε 2 i j = 0 i 1 ε 2 j + 1 ε 2 j . Summarizing these values over all iterations, we obtain statement (1). Note that the smallest integer operator · is applied due to the very nature of parity checking of 2-bit blocks. This completes the proof of the Lemma. □
The number of bits of significance for an eavesdropper may be slightly less than N A D p a r i t y since some parity equations may be linearly dependent. However, as the N 2 parity bit in the first iteration of the BP algorithm is mutually linearly independent, it always holds
N A D p a r i t y N 2 .
This means that the uncertainty of the speech signal at the input to the system is at least halved, as viewed from the eavesdropper’s side. In Figure 3, an example of the dependence of N A D p a r i t y as a function of ε is shown for N = 8640 and s = 1, 2 ,   3, 4 ,   5 .
Remark 1. 
Since our goal is a perfectly secret system, we can conclude that the first two candidate sources of common randomness cannot be used during protected communication, but only in the open operating mode, which, as a rule, precedes the protected one. Namely, in the typical use of such systems, legitimate parties establish a communication link through usual open communication. After checking the connection quality and mutual consent of the parties, the switch is made to encrypted communication. Practice shows that this part of open communication lasts 2 to 10 s. As the communication is open, the leakage of information about open speech S to the eavesdropper does not play any role; that is, previously identified sources of common randomness can be used for the safe distillation of secret keys.
Following the previous logic, a good source of common randomness could be C R ( S ^ l A ,   S ^ l B ) . Signals S ^ l A and S ^ l B were obtained using local LP syntheses with the same LSP parameters about which Eve has no information. Let us imagine two First In First Out (FIFO) buffers of identical secret random content on Alice’s and Bob’s side; see Figure 3. If we interpret this content as a set of randomly selected LSP parameters about which Eve has no information, by synchronized reading, both sides can synthesize the required signals S ^ l A and S ^ l B . In that case, Alice and Bob can use the SKD protocol over the source C R ( S ^ l A ,   S ^ l B ) to distill secret keys without Eve receiving a single bit of information from the public channel about the input speech signal S. Namely,
I S ,   S ^ l A = 0 , I S , S ^ l B = 0 ,
having in mind the way the S ^ l A and S ^ l B signals were generated. The FIFO buffer is continuously replenished with just-distilled secret keys, while the secret key sequence C is synchronously read on the receiving and transmitting side. By summarizing modulo 2 with the output sequence of the MELPe analyzer X ,
Y = X C ,
we form a perfectly secret Vernam cipher. A necessary condition for maintaining the system in continuous perfect secrecy is that the filling speed of the FIFO memories on the transmitting and receiving side must not be less than the reading speed, i.e.,
R K R C + R E .
In (5), R K is the secret key distillation rate, R C is the Vernam cipher secret key consumption rate, and R E is the consumption rate of the LP synthesizer. Note that R C must be equal to the output sequence rate of the MELPe vocoder in the main channel
R C = R M E L P e .
Figure 4 shows the generic scheme of this APS-VCS concept.

3. Identification and Analysis of Possible Sources of Common Randomness

The previous analysis shows that in the open speech phase, two sources of common randomness, C R ( S ,   S ^ ) and C R ( S ^ l ,   S ^ ) , are available. In order to evaluate which of these sources is more suitable, we conducted an experimental evaluation in real conditions of communication with the vPCP-V system (see Figure 5) and Vlatacom True Random Number Generator (vTRNG) [19,33]; see Figure 6.
For experimental evaluation, we formed a test set consisting of 24 speech signals with speakers reading the provided text. In 14 cases, the text was unique, while in the remaining 10 cases, the speakers recorded the repeated text. The signals have durations between 32 s and 59 s, are sampled at a frequency of 8 kHz, and are discretized with 16 bits per sample.
Figure 7 shows the cross-correlation function between the original input speech signal S and the synthesized received signal S ^ for sample No. 1 from the test set. Figure 8 shows the corresponding cross-correlation function between the locally synthesized speech signal S ^ l and the synthesized received signal S ^ for the same speech sample. From the examples shown, it is clear that the correlation of the common randomness source C R ( S ^ l ,   S ^ ) is, by an order of magnitude, higher than the C R ( S ,   S ^ ) source.
This fact was confirmed across the entire test sample. Figure 9 shows the logarithm ratio C r o s s C o r r S ^ l ,   S ^ C r o s s C o r r S ,   S ^ for all 24 test samples of speech signals. Only in the case of test sample No. 3 is this ratio less than 1. This indicates that the cross-correlation C r o s s C o r r S ^ l ,   S ^ is almost always significantly higher than the cross-correlation C r o s s C o r r S ,   S ^ . Therefore, we have decided to use the source C R ( S ^ l ,   S ^ ) for the execution of the SKD protocol in the open phase of communication of the APS-VCS system.

4. LSP-Based LP Synthesizer

In the open communication phase, the analyzer and synthesizer of the built-in MELPe vocoder are used to form the C R ( S ^ l ,   S ^ ) source and distill the secret keys used to initially fill the FIFO memories. For the purposes of protected communication, it is necessary to form a C R ( S ^ l A , S ^ l B ) source based on the LP synthesizer, which can be much simpler than the MELPe synthesizer. Namely, the complexity of the MELPe synthesizer originates from the complex process of forming the excitation signal in order to meet the demanding criteria of intelligibility and naturalness of the synthesized speech. This requirement has no significance in the formation of synthesized signals S ^ l A and S ^ l B . Therefore, the excitation is greatly simplified and consists of a periodic train of unit pulses, with possibly controlled jittering and the addition of locally generated purely random noise. For this purpose, in the system experimental evaluation, we used vTRNG based on a natural process entropy source with a built-in randomness checking system; see Figure 6. Figure 10 and Figure 11 show a generic scheme generator of locally synthesized signals based on random LSP parameters, periodic pulse input, and additive noise at the input and the output to the LP synthesizer filter, respectively.
The LP synthesis filter is provided by the transfer function
H z = 1 A z = 1 1 i = 1 p a i z i ,
where p is the order of the LP filter
A z = 1 i = 1 p a i z i .
If the LP filter is of the minimum phase, i.e., if all its zeros are inside the unit circle in the Z plane, the LP synthesis filter H z is stable.
The coefficients of the LP filter a i are obtained based on the loaded set of LSP parameters from the FIFO memory
φ 1 , θ 1 , φ 2 , θ 2 , , φ p 2 , θ p 2
subject to restriction
0 < φ 1 < θ 1 < φ 2 , < θ 2 , , φ p 2 < θ p 2 < π .
As is known [20], the LP filter A ( z ) can be decomposed in the form
A z = 1 2 P z + Q z
where P z and Q z are the so-called even and odd polynomials defined by LS frequencies (10)
P z = 1 + z 1 i = 1 p 2 1 e j φ i z 1 1 e j φ i z 1
Q z = 1 z 1 i = 1 p 2 1 e j θ i z 1 1 e j θ i z 1 .
If we know the LSP parameters (from (9)) by replacing (12) and (13) in (11), and then in (7), we obtain the LP synthesis filter H z . This allows for the synthesis of the signals S ^ l A and S ^ l B , used in the SKD protocol in the protected phase of system operation.
Remark 2. 
If and only if the condition (10) is strictly satisfied, i.e., if all zeros of the polynomials  P z  and  Q z  alternate in the range  ( 0 ,   π ) , it can be shown that the LP filter  A z  generated in this way is of minimum phase [34,35]. Therefore, if we randomly select p LSPs from the range 0 ,   π  and sort them in ascending order, then conduct the above procedure to form the polynomials P z Q z , and  A z , the resulting LP synthesis filter  H ( z )  will be stable.

5. Information-Theoretic Analysis of the Source of Common Randomness Based on Randomly Selected LSP Parameters

If the proposed system provides negligible leakage of distilled secret keys to Eve (see Figure 4 and Figure 12), then there is simultaneously negligible leakage of Vernam cipher secret keys in the main channel, i.e., the system is able to maintain perfect secrecy.
To justify this claim, an appropriate information-theoretic analysis should answer the following two questions:
  • What is the entropy of the signal S ^ l A and S ^ l B at the output of the LP synthesizer, and what is its structure?
Namely, the uncertainty of these signals originates from the uncertainty of the applied LSP coefficients, as well as additive purely random locally generated noise, regardless of whether it is located at the input or output of the synthesizer. Due to the closed loop that includes the LP synthesizer, SKD block, secret key FIFO buffer, and the LP synthesizer, if the local source of pure randomness had a negligible contribution to the entropy of the LP synthesizer output, the effective Key rate of generated secret keys for Vernam cipher would, over time, trend toward zero. Formally, it is valid
S ^ l A = h L S P δ + ξ ,
where h L S P is the impulse response of the LP synthesis filter H z , δ is periodic pulse input, ξ is additive pure random noise, and is the convolutional operator. Based on classical results [36,37], since
lim z H z = 1 ,
it follows that the synthesis filter H z preserves the input entropy, i.e., that it holds
H S ^ l A = H h L S P , δ + H ( ξ ) ,
regardless of whether there is additive noise at the input or output of the filter H z . Further,
H S ^ l A = H h L S P , δ + H ξ = H L S P + H ( ξ )
since there is a 1–1 correspondence between the LSP and the a i parameters of the filter H z [34].
Remark 3. 
Considering (17), it is clear that H ξ must be significantly dominant with respect to H(LSP) for S ^ l A to maintain a sufficient level of “innovation” entropy necessary for the distillation of perfectly secret keys for the Vernam cipher in the main channel.
The total entropy of synthesized signals (17) can be expressed as a function of Signal-to-Noise Ratio (SNR).
Lemma 2. 
Let Signal-to-Noise Ratio (SNR) be provided in dB. Then, the noise entropy  H ( ξ )  per one sample of the signal is equal to
H ξ = log ( 2 · A ξ ) + log ( A ξ · 2 n + 1 )
A ξ = 3 · h L S P 2 · 10 S N R 10 1 2
where n is the number of bits used to encode signal samples, ξ is the noise in the interval A ξ , A ξ , h L S P is the impulse response of the LP synthesis filter, and · has the meaning of the Euclidean norm operator.
Proof. 
Based on Theorem 8.3.1 [38], the entropy of a continuous Riemann integrable random variable X , of probability density f x , quantized with n bits is
H X = f x · log x   d x + n .
Let us first prove (18). Let the noise ξ be uniformly distributed in the interval A ξ ,   A ξ . Then the first term in (20) is equal to
A ξ A ξ 1 2 A ξ · log 1 2 A ξ d x = log 2 A ξ
while the second term is equal to the number of bits encoding the noise signal in the range A ξ ,   A ξ . Since it is equal to the number of occupied quantization levels, we obtain
log 2 A ξ 2 n = log ( A ξ · 2 n + 1 ) .
We have thus proved the correctness of statement (18). To prove statement (19), it is sufficient to directly follow the definition of SNR [dB], namely
S N R = 10 · log 10 E h S L P E ξ = 10 · log 10 3 · h L S P 2 A ξ 2
since
E ξ = V a r ξ = A ξ 2 3 .
From (23), solving for A ξ , we obtain (19), which completes the proof. □
The log notation specifically refers to l o g 2 , unless explicitly stated otherwise.
Remark 4. 
Based on Lemma 2, it follows that with the appropriate choice of SNR, we can control the size of the innovative entropy  H ( ξ )  and its dominance in relation to  H L S P . Note that  H L S P  is a fixed quantity equal to the number of bits used to encode the LSP parameters. In the case of the MELPe vocoder, its corresponding rate  R M E L P e  (6) is equal to 1.2 kb/s.
  • Is there an Eve strategy that provides her additional information about the generated keys compared to the classical sources of common randomness (CR)?
In systems with the application of the SKD protocol over classic CR sources, the basic quality criterion of the system is the amount of information I K i , e i that Eve can obtain about the generated secret keys following the communication over the public channel. Formally,
I K i , e i ,   e i = w ^ i ,   K i = G ( w i )
where w i is a random n-bit string with uniform distribution over 0,1 n at the output of the optimal Huffman encoder [39], e i is a particular value of optimal Eve’s estimate of w i , while K i = G ( w i ) is a distilled secret key. The G is chosen at random from a universal class of hash functions from 0,1 n to 0,1 K i [40]. According to well-known results from [41], specifically Corollary 4, Eve’s information about K i for specific e i and G decreases exponentially in the excess compression c K i
I K i ; G , e i = H K i H ( K i | G , e i ) 2 ( c K i ) ln 2 ,
where c is the lower bound of Eve’s conditional Renyi entropy of order two (so-called collision entropy) about w i , i.e.,
R w i e i c .
However, since, in the APS-VCS system, S ^ l A and S ^ l B depend on previously distilled secret keys, it is necessary to examine whether Eve’s information I K i 1 , e i about the K i 1 is also negligibly small. According to (26), it holds
I K i ; G , e i , K i 1 = H ( K i ) H ( K i | G , e i , K i 1 ) 2 ( R w i e i , K i 1 K i ) ln 2 2 ( c K i ) ln 2 ,
where c is the lower bound of Eve’s conditional Renyi entropy of order two about w i , i.e.,
R w i e i , K i 1 c .
Note that, in (28), by K i , we denote the distilled secret keys, when Eve possesses some information about K i 1 . Since this fact will affect her optimal strategy, and thus the length of the distilled keys, in the general case K i K i .
The optimal PA strategy must, therefore, rely on Eve’s conditional Renyi entropy, which is
m i n R w i e i , R w i e i , K i 1 ,
or in terms of their minimal values
m i n c , c .
Remark 5. 
If the conditional Renyi entropies R w i e i and R w i e i , K i 1 were identical or slightly different ( c c ) , this would mean that Eve’s information about the key K i 1 does not affect her information about the distilled key K i , and that, according to (28) and (29), this information decreases exponentially in the excess compression c K i c K i .
Whether this is true or not for APS-VCS, we have tested empirically, estimating these two distributions in an experiment with 1000 locally synthesized signals S ^ l A and S ^ l B of length 540 samples encoded with 16 bits. The SKD protocol consists of the BP algorithm for the AD phase, the Winnow algorithm for the IR phase followed by the optimal Huffman encoder and Universal hashing; see Figure 12. The selection and optimization of algorithms and parameters for the SKD protocol are thoroughly discussed in the works [14,42]. In this paper, we use parameters from those works that resulted in the highest key rate with minimal information leakage. Specifically, we use the AD algorithm for two iterations, after which the error becomes sufficiently small to be corrected by the Winnow algorithm. For the IR phase, we have chosen the 8-bit Winnow algorithm, which has been shown in [31] to be optimal in terms of minimizing the information that an eavesdropper can gain during the IR phase. For the universal class of hash functions, a binary matrix with a Toeplitz structure is used since its complexity is O ( n · l o g n ) .
Figure 13 shows the distributions of conditional Renyi entropies R w i e i and R w i e i , K i 1 , and Table 1 shows their means and variances. We can conclude that the distributions are almost identical and that extremely small differences originate from the inherent properties of random experiments on finite samples.
Remark 6. 
The presented theoretical analysis and experimental verification make it possible to conclude that the proposed APS-VCS system is resistant to attacks on the contents of the FIFO memories. This property logically follows from the properties of PA based on universal hash functions, as well as a sufficient amount of innovative entropy that refreshes the information content of the synthesized signals S ^ l A and S ^ l B . Therefore, the answer to the question of whether there is an Eve strategy that provides it an advantage over SKD systems based on classical CR sources is negative.

6. The New Privacy Amplification Strategy Based on So-Called Huffman–Renyi Difference

As is known, refs. [14,15,42], in order to efficiently utilize a particular CR source, it is necessary to adaptively determine the degree of compression of the PA block. In this way, the speed of generated secret keys is adjusted to the side information available to Eve. Complex machine-learning systems developed for these purposes can be replaced by simpler yet still very effective procedures for certain classes of CR sources. Figure 14 shows a histogram of the difference
D H R = w i R w i e i
between the length of the sequence w i at the output of the Huffman encoder and the conditional Renyi entropy R w i e i of that same sequence observed by Eve for synthesized signals with SNR = 39.9 dB. We will call the quantity D H R the Huffman–Renyi difference. We notice that the mean value is very close to 0, more precisely 1.84 bits, and that there is a negligible number of samples outside the range of 3 σ = 9.02 bits. Based on (32), we can derive a simple estimator
R ^ w i e i = w i D ^ H R .
From (33), we see that with a quality estimate for D ^ H R and knowing w i , we can also obtain a quality estimate for R w i e i . If we set D ^ H R equal to the mean value of D ¯ H R , then with high probability
R ^ w i e i w i D ¯ H R 3 · σ ^ D H R .
Bearing in mind that the degree of compression of the PA block is equal to R ^ w i e i K i , we arrive at three possible PA strategies:
K i = w i D ¯ H R , mean
K i = w i D ¯ H R 3 · σ ^ D H R   3 σ
K i = w i D ¯ H R 3 · σ ^ D H R s   3 σ + s
The strategies are ordered according to the increasing degree of compression. Strategy (37) allows the security margin s to be chosen by the predefined value of the leakage rate.

7. Experimental Evaluation

In the first step of the synthesis of the APS-VCS system, it is necessary to choose operational values for the main system parameters, such as the secret key rate, SNR of synthesized signals, innovation entropy rate, and security margin. Figure 15 shows the interdependencies of the operating ranges of these quantities, obtained on a real APS-VCS system, by averaging 100 values for each SNR value in the range from 10 to 50 dB. A distillation of secret keys was performed using three different PA strategies: mean (blue line),   3 σ   (orange line), and 3 σ + s ,   s = 20 (green line). If the PA strategy 3 σ + s is taken as a reference, and KR is at least 2.4 kb/s, it is obtained for an SNR [dB] working range [29.4, 47.5], innovative entropy [kb/s] [65, 88], KR = 2.5 kb/s, and security margin [b] [70, 460]. The order of selection is as follows; see Figure 15:
  • The desired KR is selected. Recall that it must satisfy constraints (5) and (6).
  • The security margin s is chosen in accordance with the requirements of the overall security of the system. Taking into account (26) and (28), with increasing s , the degree of compression in the PA block increases, and thus, the information Eve can obtain about the generated keys decreases exponentially.
  • The choice of security margin s uniquely determines the SNR.
  • The obtained value for SNR uniquely determines the innovative entropy.
Remark 7. 
Since for each pre-fixed KR, the security margin can be in a wide range, the system designer has great freedom to easily choose the parameters of the synthesizer that will simultaneously satisfy the requirements for the rate of generating secret keys, their maximum entropy, non-repeatability, and negligible information leakage to Eve. All these elements confirm the basic requirements that must be fulfilled by the secret keys of the Vernam cipher in order to maintain its perfect secrecy.
Figure 16 shows the functional description of the operation of the APS-VCS system. The subsystem for generating secret keys starts working after the end of the open communication phase. A necessary condition for the functioning of this subblock is the initial successful filling of the FIFO memories on the side of Alice and Bob with distilled secret keys of at least 160 bits. The first 80 bits will be used as a secret key to encrypt the LSP of the first block of the input speech signal, while the next 80 bits will be used for the LP synthesizer in the SKD block. Algorithm 1 provides a detailed explanation of the process of transforming the binary sequence into LSP parameters, while Algorithm 2 offers a detailed explanation of the transformation of LSP parameters into LP synthesis filter H(z) parameters. Table 2 shows the result of the experimental evaluation of distilled secret keys based on source C R ( S ^ l , S ^ ) during the open phase of communication. Since the average value of KR = 12.88 kb/s, just 1 s of open communication on average fills the FIFO memories with the entire 12.88 kb, which far exceeds the required 160 bits. Note that the Key Acceptance Rate (KAR) does not have to have a maximum value of 100%, which is an important indicator of the efficiency of the SKD protocol in usual applications [11]. The measured value of the exchanged bits on the public channel (average—6175 bits, max—7063 bis) per block of 8640 bits shows a significant information leakage about the input speech, which is not a security treat because it is not encrypted at this stage. The leakage rate of secret keys used to fill the initial content of the FIFO memories is only 0.0012 b/b. This value can be reduced at the request of the designer by introducing an additional security margin, which can be of the order of several hundred bits; see Figure 15.
After the phase of open communication and successful filling of the FIFO memories with the initial content, the system transitions to secure communication. Simultaneously, synthesis and public channel communication are performed. Secret keys distillation based on source C R ( S ^ l A , S ^ l B ) is now occurring. In Table 3, the results of this SKD protocol performed over the 1000 blocks and measured on the vPCP-V system are shown. Since the graphical presentation of these results is provided in Figure 15, Table 3 shows numerical results only for five characteristic SNRs, in the range from 10 to 50 dB. It is noted that in the already mentioned operating range [29.4, 47.5], KAR does not fall below 100%, while LR is in the order of 0.0011–0.0042 b/b. The presented results show that the SKD over the source C R ( S ^ l A , S ^ l B ) with large security margins ensures stable refreshment of the FIFO memories with newly generated secret keys, which are then used as secret keys of the Vernam cipher in the main channel.
As observed in Figure 15, with an increase in the SNR of the synthesizer, the KR increases regardless of the applied PA strategy. This behavior can be easily explained based on the model (14) of synthesized signals, according to which the mutual correlation between S ^ l A and S ^ l B increases with increasing SNR; that is, with the decreasing influence of local noise ξ relative to the deterministic component h L S P     δ . The decrease in innovation entropy with increasing SNR follows the same mechanism: as SNR increases, the proportion of noise ξ in the total synthesized signal decreases, and, consequently, the corresponding innovation entropy declines.
The increase in security margin s with rising SNR is directly related to its definition as the difference c K i , where c represents the lower bound of Eve’s conditional Rényi entropy of order two, and K i is the actual length of the distilled secret key; see (26). Since c directly determines the maximum KR of the specific system (a higher c leads to a higher maximum distilled KR), it is clear that the variation of the security margin will follow the same dependency with changes in SNR, as also observed in Figure 15.
Therefore, we can conclude that the experimental evaluation confirms an excellent agreement with the theoretically expected results, both in terms of the key rate and the changes in innovation entropy and security margin with respect to the SNR of the model (14).
The presented order of selecting key system parameters KR, SNR, and s can also be interpreted in the following way. The operating point B in Figure 15 is obtained at the intersection of the KR dependence on SNR and the desired value of KR. This point determines the lower bound for SNR. Point A in Figure 15 is obtained by determining the maximum allowable SNR based on the minimum permitted innovation entropy. The allowable SNR variation interval directly dictates the range of possible values for KR, innovative entropy, and security margin s .
Remark 8. 
Since SKD over the source C R ( S ^ l A , S ^ l B ) is performed independently of the system operation on the main channel, its parameters, such as sampling rate and resolution of synthesized signals, can be almost arbitrarily different, allowing for secret key generation rates in a much wider range of values. The only limiting factor of the secret key distillation rate is the communication capacity of the public channel. Therefore, the proposed APS-VCS system can operate reliably at other standard vocoder rates (2.4 kb/s, 4.8 kb/s) with the appropriate public channel bandwidth.
The price paid for the perfect secrecy of the APS-VCS system is the establishment and maintenance of a public channel during secure conversation. However, the main and public channels operate in an asynchronous mode, which significantly simplifies practical implementation. The only condition that must be met is to maintain the constant FIFO memory read rate of 1.2 kb/s for the Vernam cipher.
Algorithm 1 Binary sequence ( F I F O o u t _ 2 ) to LSP parameters transformation
Input: Binary sequence
Output: LSP parameters
1:   Read random sequence E k from FIFO, | E k | = L
2:   Divide E k in p subsequences, i.e., E k = [ E k 1 , E k 2 , . . . E k p ] , | E k i | = L p ,   i = 1 , . . . p
3:   Transform each E k i to L S P i by rescaling E k i decimal value with factor π 2 L p 1
4:   Sort obtained L S P parameters according to (10)
Algorithm 2 Transformation of LSP parameters to LP synthesis filter H(z) parameters
Input: LSP parameters
Output: H(z) parameters
1:   Calculate P(z) according to (12)
2:   Calculate Q(z) according to (13)
3:   Calculate the LP filter according to (11)
4:   Calculate the LP synthesis filter according to (7)
Table 4 shows the bit-error rate results for four typical communication channels, with and without the use of error-correcting code (ECC). For the ECC, Golay(12,24) is used, which is specifically designed to protect the 15% most sensitive bits of the binary representation of LSP parameters that are subject to encryption. It is important to note that the first two types of GSM channels produce exceptionally good results, considering the impact of the input compression block in GSM devices. These experimental results confirm the essential functionality that a highly secure voice protection system must meet [21]. The results demonstrate that the BER shown in Table 4 is independent of the SKD system, provided that the synthesizer parameters are selected to guarantee a key generation rate greater than 2.4 kb/s.

7.1. Comparison with State-of-the-Art QKD Methods

Both Quantum Key Distribution (QKD) systems and our LSP-based artificial speech synthesizer provide a foundation for perfectly secret communication by enabling the real-time generation of symmetric keys. However, they differ significantly in implementation, autonomy, and practicality when applied to low-bit-rate secure speech communication. In Table 5, Table 6, Table 7, Table 8 and Table 9, we compare the two approaches across key aspects.
Key Advantage: The LSP-based system provides common randomness generation without specialized hardware, making it significantly more practical and scalable compared to QKD.
Key Advantage: The LSP-based synthesizer ensures continuous key generation synchronized with speech encryption rates, while QKD systems often struggle with lower key refresh rates, requiring buffering or hybrid encryption approaches.
Key Advantage: Our LSP-based solution can be integrated into existing secure voice systems, whereas QKD demands costly and specialized infrastructure, limiting its practical use for low-bit-rate real-time speech encryption.
Key Advantage: While QKD offers provable key exchange security, it does not inherently provide perfect secrecy for real-time speech without additional encryption. However, our approach directly enables perfectly secret communication in real time, eliminating reliance on additional cryptographic layers.
Final Verdict: For a real-time, low-bit-rate, perfectly secret speech communication, the LSP-based artificial speech synthesizer is significantly more practical, autonomous, and scalable than QKD-based approaches. While QKD remains valuable for a high-security key exchange, it is impractical for direct application in real-time speech encryption due to infrastructure constraints and lower key refresh rates.

7.2. Potential Attacks and Countermeasures

Despite its strong theoretical foundation, the APS-VCS system must be resilient to various potential attacks. Below, we discuss major threats and how the proposed approach successfully mitigates them.
  • Man-in-the-Middle (MitM) Attacks: Since the SKD protocol relies on a public authenticated channel, an adversary could attempt to inject or manipulate messages. The use of authentication mechanisms and error correction ensures that only legitimate parties can participate in key generation, effectively preventing MitM attacks.
  • Eavesdropping Attacks: The Vernam cipher ensures perfect secrecy, making intercepted ciphertexts indecipherable without the secret key. Additionally, since secret keys are distilled in real time and never reused, an eavesdropper gains no useful information even if past communications are compromised.
  • Side-Channel Attacks: Attackers may attempt to extract key information by analyzing power consumption, timing variations, or electromagnetic emissions. Implementing countermeasures such as randomized computational delays and hardware shielding can mitigate these risks.
  • Replay Attacks: To prevent adversaries from capturing and replaying key exchange messages, each SKD session includes time-varying elements and freshness indicators. This ensures that old messages cannot be reused to compromise the system.
  • Quantum Attacks: While current quantum computers do not threaten the information-theoretic security of the Vernam cipher, they could weaken authentication and key distillation mechanisms. Future enhancements could incorporate quantum-resistant authentication schemes to ensure long-term security.

7.3. Real-World Applications and Performance Advantages

The proposed APS-VCS system offers significant advantages in real-world applications where traditional cryptographic methods fail to provide both autonomy and perfect secrecy. Below are key scenarios where APS-VCS outperforms existing solutions:
  • Military and government communications. APS-VCS eliminates the need for external trusted key distribution infrastructure, making it ideal for military and government operations where high security and operational autonomy are required. Unlike QKD-based systems, which require specialized optical infrastructure, APS-VCS operates over existing digital and mobile networks, providing real-time perfectly secret voice communication even in remote or hostile environments.
    The war in Ukraine can serve as a fresh and relevant example of the potential application and importance of APS-VCS. The combination of Starlink as a resilient and widely available public channel and APS-VCS as a secure communication system enables military units to maintain command coordination even in the most difficult circumstances without fear of eavesdropping or decryption by adversaries.
  • Security in covert and clandestine missions. Traditional secure communication devices store pre-distributed secret keys, so if a device is captured by the enemy, the entire encryption system could be compromised. In intelligence, counterinsurgency, or clandestine operations, APS-VCS ensures that no sensitive secret key material is stored or carried by field operatives. If an operative is captured or defected, no secret key information can be extracted to compromise ongoing operations.
  • Adaptability without the need for pre-deployment. Unlike traditional security systems that require prior key distribution (which can be logistically challenging and risky), APS-VCS allows users to establish secure communications dynamically. This makes it ideal for rapidly changing mission parameters where new communication nodes may need to be integrated without physical key exchanges.
  • Industrial and corporate security. Businesses dealing with sensitive intellectual property or trade secrets often rely on encrypted communication channels that depend on conventional PKI infrastructure. APS-VCS removes the need for key management through external parties, preventing potential insider threats and security breaches associated with centralized encryption key storage.
  • Tactical and emergency services. Emergency response teams require secure voice communication systems that function independently of centralized infrastructure, especially in disaster scenarios where conventional networks may be compromised. APS-VCS provides a reliable, autonomous encryption system that ensures complete secrecy of communications between first responders, law enforcement, and crisis management teams.
By addressing these practical applications, APS-VCS demonstrates clear advantages over existing cryptographic methods, particularly in scenarios where infrastructure independence, perfect secrecy, and real-time secure voice communication are crucial.

8. Conclusions

The paper presents a perfectly secret voice communication system based on a MELPe vocoder with a speed of 1.2 kb/s and Vernam’s cipher. The generation and distribution of secret keys rely on two sources of common randomness and the SKD protocol, which requires the use of an additional authenticated channel. The primary source of CR is a specially designed LP synthesizer, which ensures the required amount of innovative entropy based on a local source of randomness. By selecting appropriate security margins and synthesizer parameters, such as sample rate and SNR, the system designer can achieve the desired secret key rate of 1.2 kb/s, thereby maintaining the perfect secrecy of the Vernam cipher. The maximum security margin reaches approximately 460 bits, ensuring negligible leakage of the generated secret keys.
The requirement for an additional reliable authenticated public channel can be seen as the trade-off for achieving perfect secrecy. However, the asynchronous operation of the voice coder and cipher system in the main channel relative to the system components utilizing the public channel significantly mitigates implementation challenges, enhancing practical usability. An experimental evaluation of the vPCP-V system demonstrates the robustness of this approach across various communication channels, including the hardest one: GSM 3G and VoLTE, achieving an acceptable BER on the order of 10 3 .
While the proposed APS-VCS system meets the stringent requirements of perfect secrecy and autonomy, several directions for enhancement and integration with emerging technologies warrant further exploration. Let us mention just a few of the most interesting, such as the optimization of the SKD protocol, multiplexing of the main and public channels, and refining synthesizer models by exploring alternative excitation methods (such as neural vocoder-based synthesis, for example). A particularly promising direction for future research is hybrid architectures that combine SKD with QKD. While QKD provides provable security guarantees, its current deployment limitations (e.g., infrastructure requirements) make direct substitution challenging. However, incorporating QKD-based key exchange as an additional security layer for key refreshing could significantly enhance long-term robustness.
By addressing these future directions, the APS-VCS system can continue to evolve as a promising solution in the domain of perfectly secret voice communication. The findings presented in this paper contribute to the broader domain of secure speech transmission and highlight the potential for further innovation in autonomous cryptographic communication systems.

Author Contributions

Conceptualization, M.M. and J.R.; methodology, M.M., J.R. and Z.B.; software, J.R.; validation, M.M., J.R., S.Č. and Z.K.; formal analysis, M.M., Z.B., M.P. and D.P.; investigation, M.M. and J.R.; resources, Z.B.; data curation, S.Č. and Z.K.; writing—original draft preparation, M.M. and J.R.; writing—review and editing, M.M., J.R., S.Č., Z.K. and Z.B.; visualization, M.M. and J.R.; supervision, M.M. and Z.B.; project administration, M.M., Z.B., M.P. and D.P.; funding acquisition, Z.B. All authors have read and agreed to the published version of the manuscript.

Funding

The research is funded by the Vlatacom Institute of High Technologies under Project #164 EEG_Keys.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors upon request.

Acknowledgments

M.M. would like to thank his daughter Jasna, who participated in the creation and implementation of the founding of the so-called Cyprus experiment [43], in which it was shown for the first time that it is practically possible to implement the SKD protocol over EEG signals, which opened up a whole series of practical implementations, including the implementation shown in this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
APS-VCSAutonomous Perfectly Secure Low-Bit-Rate Voice Communication System
MELPeMixed-Excitation Linear Prediction voice coder
SKDSequential Key Distillation
LSPLinear Spectral Pairs
vPCP-VVlatacom Personal Crypto Platform for Voice encryption
OTPOne-Time-Pad
LPLinear prediction
KSGKey Stream Generator
CRCommon Randomness
ADAdvantage Distillation
IRInformation Reconciliation
BPBit Parity
FIFOFirst In First Out
vTRNGVlatacom True Random Number Generator
VoIPVoice over Internet Protocol
SNRSignal-to-Noise Ratio
KRKey Rate
LRLeakage Rate
KARKey Acceptance Rate
BERBit Error Rate
ECCError-Correcting Code
QKDQuantum Key Distribution
PKIPublic Key Infrastructure

References

  1. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  2. Vernam, G.S. Secret Signaling System. U.S. Patent 1310719A, 22 July 1919. [Google Scholar]
  3. Lugrin, T. One-Time Pad. In Trends in Data Protection and Encryption Technologies; Mulder, V., Mermoud, A., Lenders, V., Tellenbach, B., Eds.; Springer Nature: Cham, Switzerland, 2023; pp. 3–6. [Google Scholar]
  4. McCree, A.V. Low-bit-rate speech coding. In Springer Handbook of Speech Processing; Benesty, J., Sondhi, M.M., Huang, Y.A., Eds.; Springer Handbooks: Berlin/Heidelberg, Germany, 2008; pp. 331–350. [Google Scholar]
  5. MELPe TSVCIS. Available online: https://melpe.com/melpe-tsvcis/ (accessed on 15 November 2024).
  6. Nato Standardization Office. Available online: https://nso.nato.int/nso/nsdd/main/standards (accessed on 15 November 2024).
  7. Cao, Y.; Zhao, Y.; Wang, Q.; Zhang, J.; Ng, S.X.; Hanzo, L. The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Commun. Surv. Tutor. 2022, 24, 839–894. [Google Scholar] [CrossRef]
  8. Ahlswede, R.; Csiszar, I. Common randomness in information theory and cryptography. Part I: Secret sharing. IEEE Trans. Inf. Theory 1993, 39, 1121–1132. [Google Scholar] [CrossRef]
  9. Maurer, U.M. Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 1993, 39, 733–742. [Google Scholar] [CrossRef]
  10. Csiszar, I.; Narayan, P. Secrecy Capacities for Multiple Terminals. IEEE Trans. Inf. Theory 2004, 50, 3047–3061. [Google Scholar] [CrossRef]
  11. Zhang, J.; Duong, T.Q.; Marshall, A.; Woods, R. Key generation from wireless channels: A review. IEEE Access 2016, 4, 614–626. [Google Scholar] [CrossRef]
  12. Li, G.; Sun, C.; Zhang, J.; Jorswieck, E.; Xiao, B.; Hu, A. Physical Layer Key Generation in 5G and Beyond Wireless Communications: Challenges and Opportunities. Entropy 2019, 21, 497. [Google Scholar] [CrossRef] [PubMed]
  13. Zhang, J.; Duong, T.Q.; Woods, R.; Marshall, A. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview. Entropy 2017, 19, 420. [Google Scholar] [CrossRef]
  14. Radomirović, J.; Milosavljević, M.; Kovačević, B.; Jovanović, M. Secret key distillation with speech input and deep neural network-controlled privacy amplification. Mathematics 2023, 11, 1524. [Google Scholar] [CrossRef]
  15. Galis, M.; Milosavljević, M.; Jevremović, A.; Banjac, Z.; Makarov, A.; Radomirović, J. Secret-key agreement by asynchronous EEG over authenticated public channels. Entropy 2021, 23, 1327. [Google Scholar] [CrossRef]
  16. Pourbemany, J.; Zhu, Y.; Bettati, R. Survey of Wearable Devices Pairing Based on Biometric Signals. arXiv 2021, arXiv:2107.11685v1. [Google Scholar] [CrossRef]
  17. Li, G.; Zhang, Z.; Zhang, J.; Hu, A. Encrypting wireless communications on the fly using one-time pad and key generation. IEEE Internet Things J. 2020, 8, 357–369. [Google Scholar] [CrossRef]
  18. McCree, A.V.; Barnwell, T.P. A mixed excitation LPC vocoder model for low bit rate speech coding. IEEE Trans. Speech Audio Process. 1995, 3, 242–250. [Google Scholar] [CrossRef]
  19. Vlatacom Institute–Encryption & Authentication. Available online: https://www.vlatacominstitute.com/encryption-authentication (accessed on 22 October 2024).
  20. Itakura, F. Line spectrum representation of linear predictive coefficients of speech signals. J. Acoust. Soc. Am. 1975, 57, S35. [Google Scholar] [CrossRef]
  21. Ntantogian, C.; Veroni, E.; Karopoulos, G.; Xenakis, C. A survey of voice and communication protection solutions against wiretapping. Comput. Electr. Eng. 2019, 77, 163–178. [Google Scholar] [CrossRef]
  22. Pekerti, A.A.; Sasongko, A.; Indrayanto, A. Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques. IEEE Access 2024, 12, 75146–75168. [Google Scholar] [CrossRef]
  23. Čubrilović, S.; Mandić, D.; Krstić, A. Evaluation of Improved Classification of Speech-Like Waveforms Used for Secure Voice Transmission. In Proceedings of the 21st International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo, Bosnia and Herzegovina, 16–18 March 2022. [Google Scholar]
  24. Kumar, K.; Ramkumar, K.R.; Kaur, A. A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, I3878–I3885. [Google Scholar] [CrossRef]
  25. Kara, M.; Merzeh, H.R.J.; Aydın, M.A.; Balık, H.H. VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. Comput. Commun. 2023, 198, 247–261. [Google Scholar] [CrossRef]
  26. Ethereum. Available online: https://ethereum.org/en/ (accessed on 16 February 2025).
  27. Hamilton, A.; Barnett, J.; Hobbs, A.; Pelekanakis, K.; Petroccia, R.; Nissen, I.; Galsdorf, D. Towards Secure and Interoperable Underwater Acoustic Communications: Current Activities in NATO IST-174 Research Task Group. Procedia Comput. Sci. 2022, 205, 167–178. [Google Scholar] [CrossRef]
  28. Gebereselassie, S.A.; Roy, B.K. A new Secure Speech Communication Scheme Based on Hyperchaotic Masking and Modulation. IFAC-PapersOnLine 2022, 55, 914–919. [Google Scholar] [CrossRef]
  29. Fu, S.; Cheng, X.; Liu, J. Dynamics, circuit design, feedback control of a new hyperchaotic system and its application in audio encryption. Sci. Rep. 2023, 13, 19385. [Google Scholar] [CrossRef] [PubMed]
  30. Haridas, T.; Upasana, S.D.; Vyshnavi, G.; Krishnan, M.S.; Muni, S.S. Chaos-based audio encryption: Efficacy of 2D and 3D hyperchaotic systems. Frankl. Open 2024, 8, 100158. [Google Scholar] [CrossRef]
  31. Wang, Q.; Wang, X.; Lv, Q.; Ye, X.; Luo, Y.; You, L. Analysis of the information theoretically secret key agreement by public discussion. Secur. Commun. Netw. 2015, 8, 2507–2523. [Google Scholar] [CrossRef]
  32. Liu, S.L. Information-Theoretic Secret Key Agreement. Ph.D. Thesis, Technische Universiteit Eindhoven, Eindhoven, The Netherlands, 2002. [Google Scholar]
  33. Perić, M.; Milićević, P.; Banjac, Z.; Orlić, V.; Milićević, S. High speed random number generator for section key generation in encryption devices. In Proceedings of the 21st Telecommunications Forum (TELFOR), Belgrade, Serbia, 26–28 November 2013; pp. 117–120. [Google Scholar]
  34. Kabal, P.; Ramachandran, R.P. The computation of line spectral frequencies using Chebyshev polynomials. IEEE Trans. Acoust. Speech Signal Process. 1986, 34, 1419–1426. [Google Scholar] [CrossRef]
  35. Soong, F.K.; Juang, B.-W. Line spectrum pair (LSP) and speech data compression. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, San Diego, CA, USA, 19–21 March 1984; pp. 37–40. [Google Scholar]
  36. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  37. Aaron, M.R.; McDonald, R.A.; Protonotarios, E.N. Entropy Power Loss in Linear Sampled Data Filters. Proc. IEEE 1967, 55, 1093–1094. [Google Scholar] [CrossRef]
  38. Cover, T.M.; Thomas, J.A. Elements of Information Theory, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2006. [Google Scholar]
  39. Huffman, D.A. A method for the construction of minimum-redundancy codes. Proc. IRE 1952, 40, 1098–1101. [Google Scholar] [CrossRef]
  40. Carter, J.L.; Wegman, M.N. Universal classes of hash functions. J. Comput. Syst. Sci. 1979, 18, 143–154. [Google Scholar] [CrossRef]
  41. Bennett, C.H.; Brassard, G.; Crepeau, C.; Maurer, U.M. Generalized privacy amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [Google Scholar] [CrossRef]
  42. Radomirović, J.; Milosavljević, M.; Kovačević, B.; Jovanović, M. Privacy amplification strategies in sequential secret key distillation protocols based on machine learning. Symmetry 2022, 14, 2028. [Google Scholar] [CrossRef]
  43. Milosaljević, M.; Adamović, S.; Jevremovic, A.; Antonijević, M. Secret key agreement by public discussion from EEG signals of participants. In Proceedings of the 5th International Conference on Electrical, Electronic and Computing Engineering, IcETRAN, Palic, Serbia, 11–14 June 2018; pp. 1256–1259. [Google Scholar]
Figure 1. Generic scheme of low-bit-rate secure communications using MELPe voice coder. The cryptographic part of the system consists of the KSG(K) generator of the binary pseudorandom sequence C K , which is added modulo 2 with the binary sequence that comes from the analyzer. C R ( S ,   S ^ ) is denoted as the source of common randomness, formed from the input speech signal S on the transmitter side and the speech signal S ^ synthesized on the receiver side.
Figure 1. Generic scheme of low-bit-rate secure communications using MELPe voice coder. The cryptographic part of the system consists of the KSG(K) generator of the binary pseudorandom sequence C K , which is added modulo 2 with the binary sequence that comes from the analyzer. C R ( S ,   S ^ ) is denoted as the source of common randomness, formed from the input speech signal S on the transmitter side and the speech signal S ^ synthesized on the receiver side.
Symmetry 17 00365 g001
Figure 2. Extension of the generic scheme shown in Figure 1 with local MELPe synthesis on the transmitter side. C R ( S ^ l ,   S ^ ) is denoted as the source of common randomness, formed from the locally synthesized speech signal S ^ l on the transmitter side and the speech signal S ^ synthesized on the receiver side.
Figure 2. Extension of the generic scheme shown in Figure 1 with local MELPe synthesis on the transmitter side. C R ( S ^ l ,   S ^ ) is denoted as the source of common randomness, formed from the locally synthesized speech signal S ^ l on the transmitter side and the speech signal S ^ synthesized on the receiver side.
Symmetry 17 00365 g002
Figure 3. An example of the dependence of the number of parity bits exchanged over the public channel in AD phase, as a function of the initial Hamming distance of Alice and Bob’s sequence. SKD algorithm parameters: initial sequence length N = 8640 , number of iterations of the BP algorithm s = 1 ,   2 ,   3 ,   4 ,   5 .
Figure 3. An example of the dependence of the number of parity bits exchanged over the public channel in AD phase, as a function of the initial Hamming distance of Alice and Bob’s sequence. SKD algorithm parameters: initial sequence length N = 8640 , number of iterations of the BP algorithm s = 1 ,   2 ,   3 ,   4 ,   5 .
Symmetry 17 00365 g003
Figure 4. Generic scheme of the proposed APS-VCS. The pseudo-random string C is the one-time secret key of the Vernam cipher, which is read from the Secret Key FIFO buffer synchronously on Alice’s and Bob’s sides. The contents of the FIFO buffer are filled with distilled secret keys received by applying the SKD protocol to the common randomness source C R ( S ^ l A , S ^ l B ). Signals S ^ l A and S ^ l B were obtained by local LP syntheses over the same LSP parameters synchronously read from the FIFO buffer.
Figure 4. Generic scheme of the proposed APS-VCS. The pseudo-random string C is the one-time secret key of the Vernam cipher, which is read from the Secret Key FIFO buffer synchronously on Alice’s and Bob’s sides. The contents of the FIFO buffer are filled with distilled secret keys received by applying the SKD protocol to the common randomness source C R ( S ^ l A , S ^ l B ). Signals S ^ l A and S ^ l B were obtained by local LP syntheses over the same LSP parameters synchronously read from the FIFO buffer.
Symmetry 17 00365 g004
Figure 5. Vlatacom Personal Crypto Platform for voice encryption designed for use in any available communication system (Voice over Internet Protocol (VoIP), public, landline, mobile, or satellite).
Figure 5. Vlatacom Personal Crypto Platform for voice encryption designed for use in any available communication system (Voice over Internet Protocol (VoIP), public, landline, mobile, or satellite).
Symmetry 17 00365 g005
Figure 6. Vlatacom True Random Number Generator based on a natural process entropy source with built-in randomness checking system.
Figure 6. Vlatacom True Random Number Generator based on a natural process entropy source with built-in randomness checking system.
Symmetry 17 00365 g006
Figure 7. Cross-correlation between the original input speech signal S and the synthesized received signal S ^ for speaker No. 1 from the test set.
Figure 7. Cross-correlation between the original input speech signal S and the synthesized received signal S ^ for speaker No. 1 from the test set.
Symmetry 17 00365 g007
Figure 8. Cross-correlation between the locally synthesized speech signal S ^ l on the transmitter side and the synthesized signal on the receiver side S ^ for speaker No. 1 from the test set.
Figure 8. Cross-correlation between the locally synthesized speech signal S ^ l on the transmitter side and the synthesized signal on the receiver side S ^ for speaker No. 1 from the test set.
Symmetry 17 00365 g008
Figure 9. Logarithm ratio of C r o s s C o r r S ^ l ,   S ^ C r o s s C o r r S ,   S ^ for all 24 test samples of the speech signals. Only in the case of test sample No. 3 is this ratio less than 1, which means that the cross-correlation C r o s s C o r r S ^ l ,   S ^ is almost always higher than the cross-correlation C r o s s C o r r S ,   S ^ .
Figure 9. Logarithm ratio of C r o s s C o r r S ^ l ,   S ^ C r o s s C o r r S ,   S ^ for all 24 test samples of the speech signals. Only in the case of test sample No. 3 is this ratio less than 1, which means that the cross-correlation C r o s s C o r r S ^ l ,   S ^ is almost always higher than the cross-correlation C r o s s C o r r S ,   S ^ .
Symmetry 17 00365 g009
Figure 10. Generator of locally synthesized signals S ^ l A based on random LSP parameters, periodic pulse input δ , and additive noise ξ at the input to the LP synthesizer filter.
Figure 10. Generator of locally synthesized signals S ^ l A based on random LSP parameters, periodic pulse input δ , and additive noise ξ at the input to the LP synthesizer filter.
Symmetry 17 00365 g010
Figure 11. Generator of locally synthesized signals S ^ l A based on random LSP parameters, periodic pulse input δ , and additive noise ξ at the output of the LP synthesizer filter.
Figure 11. Generator of locally synthesized signals S ^ l A based on random LSP parameters, periodic pulse input δ , and additive noise ξ at the output of the LP synthesizer filter.
Symmetry 17 00365 g011
Figure 12. Information flows of importance for the analysis of distilled secret keys in the system. The SKD protocol consists of the BP algorithm for the AD phase, the Winnow algorithm for the IR phase, and an optimal Huffman encoder. The PA phase is based on universal hash functions.
Figure 12. Information flows of importance for the analysis of distilled secret keys in the system. The SKD protocol consists of the BP algorithm for the AD phase, the Winnow algorithm for the IR phase, and an optimal Huffman encoder. The PA phase is based on universal hash functions.
Symmetry 17 00365 g012
Figure 13. Alice, Bob, and Eve have the same Huffman encoder. Blue line: Probability density of conditional Renyi entropy R w i e i , K i 1 when the random LSP parameters of Alice, Bob, and Eve synthesizers are the same, i.e., L S P A = L S P B = L S P E . Orange line: Probability density of conditional Renyi entropy R w i e i when L S P A = L S P B L S P E .
Figure 13. Alice, Bob, and Eve have the same Huffman encoder. Blue line: Probability density of conditional Renyi entropy R w i e i , K i 1 when the random LSP parameters of Alice, Bob, and Eve synthesizers are the same, i.e., L S P A = L S P B = L S P E . Orange line: Probability density of conditional Renyi entropy R w i e i when L S P A = L S P B L S P E .
Symmetry 17 00365 g013
Figure 14. Empirical distribution of Huffman–Renyi distance D H R   ( D ¯ H R = 1.84 ,   σ ^ D H R = 2.39 ) for synthesized signals with parameter SNR = 39.9 dB.
Figure 14. Empirical distribution of Huffman–Renyi distance D H R   ( D ¯ H R = 1.84 ,   σ ^ D H R = 2.39 ) for synthesized signals with parameter SNR = 39.9 dB.
Symmetry 17 00365 g014
Figure 15. Interdependencies of operational ranges of main quantities: secret key rate, SNR of synthesized signals, innovation entropy rate, and security margin in the synthesis of APS-VCS system. Security margin dependence on SNR is shown for the secret key rate of 2.5 kb/s.
Figure 15. Interdependencies of operational ranges of main quantities: secret key rate, SNR of synthesized signals, innovation entropy rate, and security margin in the synthesis of APS-VCS system. Security margin dependence on SNR is shown for the secret key rate of 2.5 kb/s.
Symmetry 17 00365 g015
Figure 16. APS-VCS system function in transmission mode. The system function in reception mode is fundamentally of the same structure.
Figure 16. APS-VCS system function in transmission mode. The system function in reception mode is fundamentally of the same structure.
Symmetry 17 00365 g016
Table 1. Mean values and standard deviations of corresponding Renyi entropies from Figure 13.
Table 1. Mean values and standard deviations of corresponding Renyi entropies from Figure 13.
Renyi EntropyMean ± Std
R w i e i , K i 1 1244.01 ± 97.84
R w i e i 1246.66 ± 101.49
Table 2. Results of SKD protocol performed over the 24 speakers in the first open stage of communication, measured on vPCP-V system.
Table 2. Results of SKD protocol performed over the 24 speakers in the first open stage of communication, measured on vPCP-V system.
Performance MeasuresMean Value
KR [kb/s]12.88
KR [%]9.98
KAR [%]51.93
Mean number of parity bits [per block]6175
Max number of parity bits [per block]7063
LR [b/b]0.0012
Table 3. Results of SKD protocol performed over the 1000 blocks in the secure stage of communication, measured on vPCP-V system.
Table 3. Results of SKD protocol performed over the 1000 blocks in the secure stage of communication, measured on vPCP-V system.
LSP-Based Artificial Synthesizer
SNR [dB]5039.9029.8019.7010
KR [kb/s]9.96 ± 1.546.44 ± 1.353.04 ± 1.060.53 ± 0.470.08 ± 0.08
KR [%]7.785.032.380.420.05
KAR [%]100100100757
LR [b/b]0.00110.00150.00420.03990.0191
Table 4. BER for different audio channels with and without ECC.
Table 4. BER for different audio channels with and without ECC.
Audio ChannelBER
Without FEC
BER
with FEC
GSM 3G1.20·10−31.02·10−3
GSM VoLTE1.50·10−31.20·10−3
WhatsApp5.50·10−34.70·10−3
Google meet7.90·10−33.40·10−3
Table 5. Key generation and common randomness source.
Table 5. Key generation and common randomness source.
FeatureLSP-Based SynthesizerQKD Systems
Randomness sourceArtificially synthesized speech with LSP parameters and independent true randomnessQuantum states (e.g., photon polarization, phase encoding)
AutonomyFully autonomous; does not require an external infrastructureRequires quantum hardware, optical links, or satellite-based transmission
SynchronizationEnsured by deterministic control over speech synthesisRequires precise alignment of quantum detectors
ScalabilityEasily deployable over existing
digital networks
Limited by quantum optical
infrastructure requirements
Table 6. Key agreement and distribution over public channel.
Table 6. Key agreement and distribution over public channel.
FeatureLSP-Based SynthesizerQKD Systems
Sequential Key
Distillation (SKD)
Public-authenticated channel used for error correction and privacy amplificationQuantum transmission
requires classical reconciliation
Man-in-the-Middle ResistanceAuthentication prevents key
injection attacks
QKD offers provable security against eavesdropping
Key Refresh RateMatches low-bit-rate vocoder
encryption rates (1.2–2.4 kbps)
Limited by quantum transmission rate, often lower than needed for real-time speech
Table 7. Infrastructure and practical deployment.
Table 7. Infrastructure and practical deployment.
FeatureLSP-Based SynthesizerQKD Systems
Hardware
Requirements
Software-implemented; requires only a standard vocoderRequires quantum transmitters, detectors, and optical fiber/satellite links
Network
Compatibility
Operates over existing VoIP, GSM, LTE, and secure radio linksRequires a dedicated quantum communication channel
Real-World
Deployability
Can be implemented on secure mobile and tactical communication devicesLimited to specialized government, military, and financial institutions
Table 8. Security guarantees and theoretical limits.
Table 8. Security guarantees and theoretical limits.
FeatureLSP-Based SynthesizerQKD Systems
Perfect Secrecy
Guarantee
Achieved through one-time pad encryption with real-time key agreementProvably secure key exchange, but requires additional
encryption (e.g., AES)
Information-Theoretic SecuritySecurity based on shared
entropy extraction
Quantum no-cloning theorem ensures eavesdropper detection
Resistance to Active AttacksImmune to classical
cryptanalysis and quantum computing threats
Secure against quantum
computing but vulnerable to side-channel attacks on
implementation
Table 9. LSP-based speech synthesis vs. QKD for real-time secure speech.
Table 9. LSP-based speech synthesis vs. QKD for real-time secure speech.
CriterionLSP-Based SynthesizerQKD Systems
Deployment
Feasibility
High—Works with existing digital networksLow—Requires dedicated infrastructure
AutonomyFully autonomous, no external TTP neededRequires trusted quantum network infrastructure
ScalabilityEasily deployable over VoIP, LTE, radioLimited to fiber-optic or satellite links
Synchronization with Speech EncryptionDesigned to match real-time low-bit-rate voice codersOften too slow for real-time voice encryption
Security ModelInformation-theoretic security with OTPProvable key distribution security but requires classical encryption
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Radomirović, J.; Milosavljević, M.; Čubrilović, S.; Kuzmanović, Z.; Perić, M.; Banjac, Z.; Perić, D. A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems. Symmetry 2025, 17, 365. https://doi.org/10.3390/sym17030365

AMA Style

Radomirović J, Milosavljević M, Čubrilović S, Kuzmanović Z, Perić M, Banjac Z, Perić D. A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems. Symmetry. 2025; 17(3):365. https://doi.org/10.3390/sym17030365

Chicago/Turabian Style

Radomirović, Jelica, Milan Milosavljević, Sara Čubrilović, Zvezdana Kuzmanović, Miroslav Perić, Zoran Banjac, and Dragana Perić. 2025. "A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems" Symmetry 17, no. 3: 365. https://doi.org/10.3390/sym17030365

APA Style

Radomirović, J., Milosavljević, M., Čubrilović, S., Kuzmanović, Z., Perić, M., Banjac, Z., & Perić, D. (2025). A Class of Perfectly Secret Autonomous Low-Bit-Rate Voice Communication Systems. Symmetry, 17(3), 365. https://doi.org/10.3390/sym17030365

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop