Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walking
نویسندگان
چکیده
In this work an efficient format-compliant encryption approach for regular languages is proposed, block-based cycle-walking. The approach can transparently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the regular language of JPEG2000 bitstreams is compared to the extensive previous work from the multimedia security community and to the previous work from the cryptographic community, which is analyzed and evaluated.
منابع مشابه
Reverse Cycle Walking and Its Applications
We study the problem of constructing a block-cipher on a “possibly-strange” set S using a block-cipher on a larger set T . Such constructions are useful in format-preserving encryption, where for example the set S might contain “valid 9-digit social security numbers” while T might be the set of 30-bit strings. Previous work has solved this problem using a technique called cycle walking, first f...
متن کاملEfficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability
A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compliant plaintext and produces syntax-compliant ciphertext. It is faster than all the other syntax-compliant encryption primitives we know. Our JPEG 2000 encryption scheme encrypts independent...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملFormat-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability, and the Impact of Compression Parameters
JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security and performance of format, compliant encryption schemes. In this work, a thorough analysis of this topic is presented with a focus on format-compliant packet body encryption as sketched in t...
متن کاملCycle Slicer: An Algorithm for Building Permutations on Special Domains
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in format-preserving encryption: domain targeting and domain completion. In domain targeting, where we wish to use a cipher on domain X to construct a cipher on a smaller domain S ⊆ X , using Cycle Slicer leads to a significantly more efficient solution than Miracle and Yilek’s Reverse Cycle Walking...
متن کامل