1993-08-11 - Re: Secure voice software issues

Header Data

From: hfinney@shell.portal.com
To: cypherpunks@toad.com
Message Hash: cac33a046f5e79c67245c65351e902673fe3e60806738157a1a61bff96464b21
Message ID: <9308110421.AA29116@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1993-08-11 19:47:23 UTC
Raw Date: Wed, 11 Aug 93 12:47:23 PDT

Raw message

From: hfinney@shell.portal.com
Date: Wed, 11 Aug 93 12:47:23 PDT
To: cypherpunks@toad.com
Subject: Re: Secure voice software issues
Message-ID: <9308110421.AA29116@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain


A couple of comments on the cryptophone idea.

First, there has seemed to be general agreement in our earlier discussions
of this concept that the hard part is compressing the voice to the point
where it can go over commonly-available modems.  The government-standard
CELP algorithm is too slow for general-purpose home computers.  You need
an algorithm that can operate in real time and compress intelligibly down
to about 13K bits per second.  It has to be either able to compress and
decompress simultaneously or else you need some switching logic to decide
which person is talking and which is listening at each moment, with both
sides reversing roles in synchrony.

Second, Diffie-Hellman key exchange will probably take about as long as
an RSA decryption with similar modulus sizes.  So speed would not seem to
be a reason to choose DH over RSA for key exchange.  If PGP is slow on
your machine, DH will be, too.

Hal Finney
hfinney@shell.portal.com





Thread