Cryptanalysis of a data security protection scheme for VoIP

被引:17
作者
Li, CQ
Li, S
Zhang, D
Chen, G
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
[2] Hong Kong Polytech Univ, Dept Ingn Elect & Informat, Kowloon, Hong Kong, Peoples R China
[3] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2006年 / 153卷 / 01期
关键词
D O I
10.1049/ip-vis:20045234
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A voice-over-Internet protocol technique with a new hierarchical data security protection (HDSP) scheme using a secret chaotic bit sequence has been recently proposed. Some insecure properties of the HDSP scheme are pointed out and then used to develop known/chosen-plaintext attacks. The main findings are: given n known plaintexts, about (100 - (50/2(n)))% of secret chaotic bits can be uniquely determined; given only one specially-chosen plaintext, all secret chaotic bits can be uniquely derived; and the secret key can be derived with practically small computational complexity when only one plaintext is known (or chosen). These facts reveal that HDSP is very weak against known/chosen-plaintext attacks. Experiments are given to show the feasibility of the proposed attacks. It is also found that the security of HDSP against the brute-force attack is not practically strong. Some countermeasures are discussed for enhancing the security of HDSP and several basic principles are suggested for the design of a secure encryption scheme.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 8 条
[1]   New voice over Internet protocol technique with hierarchical data security protection [J].
Guo, JI ;
Yen, JC ;
Pai, HF .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (04) :237-243
[2]  
GUO JI, 2002, P INT COMP S ICS 200
[3]  
HAO BL, 1993, STARTING PARABOLS IN
[4]  
KULATHUMANI V, 1999, VOICE IP PRODUCTS SE
[5]  
Li CQ, 2004, LECT NOTES COMPUT SC, V3333, P418
[6]   A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Shujun ;
Li, Chengqing ;
Chen, Guanrong ;
Bourbakis, Nikolaos G. ;
Lo, Kwok-Tung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2008, 23 (03) :212-223
[7]  
Li SJ, 2005, INTERNET COMMUN SER, P133
[8]  
Schneier B, 1996, APPL CRYPTOGRAPHY