Cryptanalysis of some multimedia encryption schemes

被引:98
|
作者
Jakimoski, Goce [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
基金
美国国家科学基金会;
关键词
arithmetic coding; cryptanalysis; key-based interval splitting; multimedia encryption; multiple Huffman tables; randomized arithmetic coding;
D O I
10.1109/TMM.2008.917355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is one of the fundamental technologies that is used in digital rights management. Unlike ordinary computer applications, multimedia applications generate large amounts of data that has to be processed in real time. So, a number of encryption schemes for multimedia applications have been proposed in recent years. We analyze the following proposed methods for multimedia encryption: key-based multiple Huffman tables (MHT), arithmetic coding with key-based interval splitting (KSAC), and randomized arithmetic coding (RAC). Our analysis shows that MHT and KSAC are vulnerable to low complexity known- and/or chosen-plaintext attacks. Although we do not provide any attacks on RAC, we point out some disadvantages of RAC over the classical compress-then-encrypt approach.
引用
收藏
页码:330 / 338
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis of adaptive arithmetic coding encryption schemes
    Lim, J
    Boyd, C
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 216 - 227
  • [2] Cryptanalysis of the Parameterized Improved Fast Encryption Algorithm for Multimedia
    Al-Zaidy, Rabeah
    Kircanski, Aleksandar
    Youssef, Amr M.
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (12) : 886 - 887
  • [3] Cryptanalysis of multimedia encryption using elliptic curve cryptography
    Singh, Khoirom Motilal
    Singh, Laiphrakpam Dolendro
    Tuithung, Themrichon
    OPTIK, 2018, 168 : 370 - 375
  • [4] Hybrid Multimedia Broadcast Encryption Schemes
    Li, Tao
    Guo, Huaqun
    Ma, Maode
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [5] Cryptanalysis and improvement of two convertible authenticated encryption schemes
    Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
  • [6] Cryptanalysis of a chaotic neural network based multimedia encryption scheme
    Li, CQ
    Li, SJ
    Zhang, D
    Chen, GR
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 418 - +
  • [7] Cryptanalysis of fast encryption algorithm for multimedia FEA-M
    Mihaljevic, MJ
    Kohno, R
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (09) : 382 - 384
  • [8] Cryptanalysis of Some Electronic Checkbook Schemes
    Sertkaya, Isa
    Kalkar, Oznur
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 603 - 612
  • [9] Cryptanalysis of ElGamal type encryption schemes based on conic curves
    Dai, ZD
    Ye, DF
    Pei, DY
    Yang, JH
    ELECTRONICS LETTERS, 2001, 37 (07) : 426 - 426
  • [10] Differential Cryptanalysis of Two Joint Encryption and Error Correction Schemes
    Chai, Qi
    Gong, Guang
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,