Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication

Main Article Content

Jenan Ayad
Noor Qaddoori
Hasanain Maytham

Abstract

In today's communications, it is vital to protect audio data privacy before and after transfer. This work therefore introduces the enhanced audio encryption scheme (EAES), which employs the most effective techniques of cryptography and processes them to make it impossible for unauthorized persons or programs to access or change the contents of audio files. This method uses RSA to encrypt the Blowfish key, which is used for data encryption, the HMAC-SHA256 algorithm for integrity checks, and the Message-Digest algorithm (MD5) for the checking phase. The performance of the EAES is measured statistically via the MSE, PSNR, and correlation coefficient. For the encrypted signal, the MSE was approximately 2×1072, whereas for the decrypted signal, the MSE was zero, which means that the original signal was the same as the processed signal. The PSNR for the decrypted signal was inf. The correlation coefficient test for the decrypted signal was 1, and that for the encrypted signal was 0.0006. The experimental results show that this technique can securely encrypt and decode an audio stream while maintaining its quality and being resistant to popular attacks. This method provides a dependable method of securing extremely sensitive audio data in a variety of applications that demand high security.





 


 


 


 


 

Article Details

Section

Articles

How to Cite

Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication (J. . Ayad, N. . Qaddoori, & H. . Maytham , Trans.). (2025). Mesopotamian Journal of CyberSecurity, 5(1), 178-186. https://doi.org/10.58496/MJCS/2025/012

References

[1] G. Ali and M. M. Mijwil, “Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 20–62, May 2024, doi: 10.58496/MJCS/2024/006.

[2] J. Ayad, F. S. Hasan, and A. H. Ali, “Image encryption using One Dimensional Chaotic Map and transmission Through OFDM system,” in 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023, pp. 1–7.

[3] M. Mijwil, O. J. Unogwu, Y. Filali, I. Bala, and H. Al-Shahwani, “Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview,” Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 57–63, 2023, doi: 10.58496/MJCS/2023/010.

[4] J. Ayad, F. S. Hasan, and A. H. Ali, “OFDM Transmission for encrypted Images based on 3D Chaotic Map and S-Box through Fading Channel,” in 2023 International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES), Tumakuru, India, 2023, pp. 1–6.

[5] F. Hazzaa, M. M. Hasan, A. Qashou, and S. Yousef, “A New Lightweight Cryptosystem for IoT in Smart City Environments,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp. 46–58, 2024, doi: 10.58496/MJCS/2024/015.

[6] S. Anderson and J. Smith, “SecureAudioCrypt: A Hybrid Approach to Audio Encryption,” Journal of Network Security, vol. 14, no. 2, pp. 120–135, 2024.

[7] H. Omotunde and M. Ahmed, “A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond,” Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 115–133, 2023, doi: 10.58496/MJCSC/2023/016.

[8] G. Al-Kateb, I. Khaleel, and M. Aljanabi, “CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 3, pp. 150–163, 2024, doi: 10.58496/MJCS/2024/013.

[9] K. Jones, “Recent Advances in Audio Encryption: A Comprehensive Review,” IEEE Security & Privacy Magazine, vol. 11, no. 3, pp. 45–58, 2020.

[10] E. Smith and F. White, “Performance and Security Analysis of ChaCha20 in Audio Encryption,” Journal of Cryptography and Network Security, vol. 25, no. 2, pp. 78–92, 2022.

[11] R. Davis, “Twofish: Security and Performance Evaluation in Audio Encryption,” IEEE Transactions on Audio Processing, vol. 16, no. 3, pp. 150–165, 2021.

[12] T. Clark and L. Brown, “Advances in Twofish: A Comparative Study in Audio Encryption,” Journal of Information Security and Applications, vol. 20, no. 4, pp. 210–225, 2020.

[13] B. Lee and S. Kim, “Enhancing RSA for Audio Encryption: Challenges and Opportunities,” Journal of Systems & Software, vol. 30, no. 2, pp. 210–225, 2022.

[14] J. Ayad, F. S. Hasan, and A. H. Ali, “Efficient Transmission of Secure Images with OFDM using Chaotic Encryption,” in 2022 4th International Conference on Circuits, Control, Communication and Computing (I4C), Bangalore, India, 2022, pp. 391–396.

[15] J. Namuq, F. Hasan, and A. Ali, “Image encryption based on S-box and 3D-chaotic maps and secure image transmission through OFDM in Rayleigh Fading Channel,” Engineering and Technology Journal, vol. 42, no. 2, pp. 288–297, 2024.

[16] R. M. Al-Amri, D. N. Hamood, and A. K. Farhan, “Theoretical Background of Cryptography,” Mesopotamian Journal of CyberSecurity, vol. 2023, pp. 7–15, 2023, doi: 10.58496/MJCS/2023/002.

[17] J. Smith, “Real-time AES encryption for secure VoIP communications,” Journal of Network Security, vol. 12, no. 3, pp. 45–58, 2020.

[18] R. Gupta and M. Patel, “Efficient audio encryption using ChaCha20,” International Journal of Information Security, vol. 14, no. 2, pp. 102–117, 2021.

[19] Y. Kim, “Twofish encryption for secure audio and multimedia transmission,” Multimedia Tools and Applications, vol. 81, no. 4, pp. 345–360, 2022.

[20] L. Zhao and T. Wang, “Quantum-safe audio encryption using lattice-based cryptography,” Journal of Cryptographic Engineering, vol. 15, no. 1, pp. 85–100, 2023.

[21] P. Hernandez and S. Lee, “A hybrid RSA-AES approach for secure audio data encryption,” Journal of Computer Security, vol. 28, no. 2, pp. 113–129, 2020.

[22] T. F. Quilala and R. L. Quilala, “Modified blowfish algorithm analysis using derivation cases,” Bulletin of Electrical Engineering and Informatics, vol. 10, no. 4, pp. 2192–2200, 2021, doi: 10.11591/eei.v10i4.2292.

[23] B. Park, J. Song, and S. C. Seo, “Efficient Implementation of a Crypto Library Using Web Assembly,” Electronics, vol. 9, no. 1839, 2020, doi: 10.3390/electronics9111839.

[24] D. Brown, “AES: Analysis of Security and Performance,” Journal of Cybersecurity, vol. 28, no. 2, pp. 110–125, 2023.

[25] G. Amirthayogam, N. Kumaran, S. Gopalakrishnan, K. Brito, S. RaviChand, and S. B. Choubey , Trans., “Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities”, BJN, vol. 2024, pp. 88–97, Jul. 2024, doi: 10.58496/BJN/2024/010.

[26] S. Y. Mohammed and M. Aljanabi, “Human-Centric IoT for Health Monitoring in the Healthcare 5.0 FrameworkDescriptive Analysis and Directions for Future Research”, EDRAAK, vol. 2023, pp. 21–26, Mar. 2023, doi: 10.70470/EDRAAK/2023/005.

Similar Articles

You may also start an advanced similarity search for this article.