Cryptanalysis of some multimedia encryption schemes

被引:99
作者
Jakimoski, Goce [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
基金
美国国家科学基金会;
关键词
arithmetic coding; cryptanalysis; key-based interval splitting; multimedia encryption; multiple Huffman tables; randomized arithmetic coding;
D O I
10.1109/TMM.2008.917355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is one of the fundamental technologies that is used in digital rights management. Unlike ordinary computer applications, multimedia applications generate large amounts of data that has to be processed in real time. So, a number of encryption schemes for multimedia applications have been proposed in recent years. We analyze the following proposed methods for multimedia encryption: key-based multiple Huffman tables (MHT), arithmetic coding with key-based interval splitting (KSAC), and randomized arithmetic coding (RAC). Our analysis shows that MHT and KSAC are vulnerable to low complexity known- and/or chosen-plaintext attacks. Although we do not provide any attacks on RAC, we point out some disadvantages of RAC over the classical compress-then-encrypt approach.
引用
收藏
页码:330 / 338
页数:9
相关论文
共 50 条
[21]   Cryptanalysis of Two Identification Schemes [J].
Tan, Syh-Yuan ;
Chin, Ji-Jian ;
Behnia, Rouzbeh .
2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, :33-36
[22]   (Quantum) Cryptanalysis of Misty Schemes [J].
Gouget, Aline ;
Patarin, Jacques ;
Toulemonde, Ambre .
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 :43-57
[23]   Cryptanalysis of the cellular message encryption algorithm [J].
Wagner, D ;
Schneier, B ;
Kelsey, J .
ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 :526-537
[24]   Cryptanalysis of Comparable Encryption in SIGMOD'16 [J].
Horst, Caleb ;
Kikuchi, Ryo ;
Xagawa, Keita .
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, :1069-1084
[25]   Cryptanalysis of an embedded systems’ image encryption [J].
Imad El Hanouti ;
Hakim El Fadili ;
Khalid Zenkouar .
Multimedia Tools and Applications, 2021, 80 :13801-13820
[26]   Cryptanalysis of an encryption scheme for binary images [J].
Chang, CC ;
Yu, TX .
PATTERN RECOGNITION LETTERS, 2002, 23 (14) :1847-1852
[27]   Cryptanalysis of an ergodic chaotic encryption algorithm [J].
王兴元 ;
谢旖欣 ;
秦学 .
Chinese Physics B, 2012, (04) :163-169
[28]   Cryptanalysis of an ergodic chaotic encryption algorithm [J].
Wang Xing-Yuan ;
Xie Yi-Xin ;
Qin Xue .
CHINESE PHYSICS B, 2012, 21 (04)
[29]   Cryptanalysis of optical encryption: a heuristic approach [J].
Gopinathan, Unnikrishnan ;
Monaghan, David S. ;
Naughton, Thomas J. ;
Sheridan, John T. .
INFORMATION OPTICS, 2006, 860 :169-177
[30]   Cryptanalysis of an embedded systems' image encryption [J].
El Hanouti, Imad ;
El Fadili, Hakim ;
Zenkouar, Khalid .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) :13801-13820