Combined data encryption and compression using chaos functions

被引:1
作者
Bose, R [1 ]
Pathak, S [1 ]
机构
[1] Indian Inst Technol, Dept Elect Engn, New Delhi 110016, India
来源
MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION VII, WITH APPLICATIONS | 2004年 / 5561卷
关键词
symmetric key cryptography; variable model; arithmetic coding; chaos; compression; encryption;
D O I
10.1117/12.561800
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Past research in the field of cryptography has not given much consideration to arithmetic coding as a feasible encryption technique, with studies proving compression-specific arithmetic. coding to be largely unsuitable for encryption. Nevertheless, adaptive modelling, which offers a huge model, variable in structure, and as completely as possible a function of the entire text that has been transmitted since the time the model was initialised, is a suitable candidate for a possible encryption-compression combine. The focus of the work presented in this paper has been to incorporate recent results of chaos theory, proven to be cryptographically secure, into arithmetic coding, to devise a convenient method to make the structure of the model unpredictable and variable in nature, and yet to retain, as far as is possible, statistical harmony, so that compression is possible. A chaos-based adaptive arithmetic coding-encryption technique has been designed, developed and tested and its implementation has been discussed. For typical text files, the proposed encoder gives compression between 67.5% and 70.5%, the zero-order compression suffering by about 6% due to encryption, and is not susceptible to previously carried out attacks on arithmetic coding algorithms.
引用
收藏
页码:164 / 175
页数:12
相关论文
共 47 条
[1]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[2]   Cryptanalysis of a chaotic encryption system [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2000, 276 (1-4) :191-196
[3]  
Alvarez G., 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), P332, DOI 10.1109/CCST.1999.797933
[4]  
[Anonymous], ELECT LETT
[5]  
[Anonymous], 2001, IMA INT C CRYPT COD
[6]  
[Anonymous], ACM COMPUT SURV
[7]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[8]  
Bergen H. A., 1992, Computers & Security, V11, P445, DOI 10.1016/0167-4048(92)90011-F
[9]   Chosen plaintext attack on an adaptive arithmetic coding compression algorithm [J].
Bergen, Helen A. ;
Hogan, James M. .
Computers and Security, 1993, 12 (02) :157-167
[10]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V547, P532