UM  > Personal research not belonging to the institution
Residential Collegefalse
Status已發表Published
Adaptive chosen-ciphertext attack on secure arithmetic coding
Jiantao Zhou; Oscar C. Au; Peter Hon-Wah Wong
2009-01-23
Source PublicationIEEE Transactions on Signal Processing
ISSN1053-587X
Volume57Issue:5Pages:1825-1838
Abstract

The paper ldquosecure arithmetic codingrdquo (in IEEE Transactions on Signal Processing, vol. 55, no. 5, pp. 2263-2272, May 2007) presented a novel encryption scheme called the secure arithmetic coding (SAC) based on the interval splitting arithmetic coding (ISAC) and a series of permutations. In the current work, we study the security of the SAC under an adaptive chosen-ciphertext attack. It is shown that the key vectors used in the codeword permutation step can be recovered with complexity O ( N ), where N is the symbol sequence length. After getting these key vectors, we can remove the codeword permutation step, and the resulting system has already been shown to be insecure in the original paper. This implies that the SAC is not suitable for the applications where the attacker can have access to the decoder. In addition, we discuss a method to jointly enhance the security and the performance of the SAC.

KeywordAdaptive Chosen-ciphertext Attack Arithmetic Coding Digital Rights Management Multimedia Encryption
DOI10.1109/TSP.2009.2013901
URLView the original
Indexed BySCIE ; CPCI-S
Language英語English
WOS Research AreaEngineering
WOS SubjectEngineering, Electrical & Electronic
WOS IDWOS:000265437900014
Scopus ID2-s2.0-65649146097
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionPersonal research not belonging to the institution
AffiliationDepartment of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, Chin
Recommended Citation
GB/T 7714
Jiantao Zhou,Oscar C. Au,Peter Hon-Wah Wong. Adaptive chosen-ciphertext attack on secure arithmetic coding[J]. IEEE Transactions on Signal Processing, 2009, 57(5), 1825-1838.
APA Jiantao Zhou., Oscar C. Au., & Peter Hon-Wah Wong (2009). Adaptive chosen-ciphertext attack on secure arithmetic coding. IEEE Transactions on Signal Processing, 57(5), 1825-1838.
MLA Jiantao Zhou,et al."Adaptive chosen-ciphertext attack on secure arithmetic coding".IEEE Transactions on Signal Processing 57.5(2009):1825-1838.
Files in This Item: Download All
File Name/Size Publications Version Access License
Adaptive_Chosen-Ciph(1076KB)期刊论文作者接受稿开放获取CC BY-NC-SAView Download
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Jiantao Zhou]'s Articles
[Oscar C. Au]'s Articles
[Peter Hon-Wah Wong]'s Articles
Baidu academic
Similar articles in Baidu academic
[Jiantao Zhou]'s Articles
[Oscar C. Au]'s Articles
[Peter Hon-Wah Wong]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Jiantao Zhou]'s Articles
[Oscar C. Au]'s Articles
[Peter Hon-Wah Wong]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: Adaptive_Chosen-Ciphertext_Attack_on_Secure_Arithmetic_Coding.pdf
Format: Adobe PDF
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.