Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.
KeywordsEncryption Algorithm Cipher Text Message Space Encrypt Message Selective Encryption
Unable to display preview. Download preview PDF.
- 1.H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions in Signal Processing, 48(8):2439–2451, August 2000.Google Scholar
- 2.M. Van Droogenbroeck and R. Benedett. Techniques for a selective encryption of uncom-pressed and compressed images. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS'02), pages 90–97, Ghent, Belgium, September 9–11, 2002.Google Scholar
- 4.T. Kunkelmann and U. Horn. Video encryption based on data partitioning and scalable coding: A comparison. In T. Plagemann and V. Goebel, editors, Proceedings of the 5th Inter-active Distributed Multimedia Systems and Telecommunication Services (IDMS'98), volume 1483 of Lecture Notes in Computer Science, pages 95–106, Oslo, Norway, September 8–11, 1998. Springer-Verlag.Google Scholar
- 5.Y. Li, Z. Chen, S. M. Tan, and R. H. Campbell. Security enhanced MPEG player. In Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96), pages 169–176, Berlin, Germany, March 25–26 1996.Google Scholar
- 6.S. Lindskog and A. Brunstrom. Design and implementation of a tunable encryption service for networked applications. In Proceedings of the First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SecQoS 2005), September 9, 2005. To appear.Google Scholar
- 7.T. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Communications Magazine, 42(5): 124–129, May 2004.Google Scholar
- 8.K.-w. Lye and J. Wing. Game strategies in network security. In Proceedings of Foundations of Computer Security, Copenhagen, Denmark, July 25–26, 2002.Google Scholar
- 9.J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.
- 10.Alec D. E. Muffett. Crack: A sensible passward checker for UNIX, 1992.Google Scholar
- 12.J. O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD thesis, University of Minnesota, Minnesota, USA, 1999.Google Scholar
- 13.M. Podesser, H. P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmission of image data in mobile environments. In Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG '02), Tromsø/Trondheim, Norway, October 4–6, 2002.Google Scholar
- 14.K. Sallhammar and S. J. Knapskog. Using game theory in stochastic models for quantifying security. In Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), Espoo, Finland, November 4–5, 2004.Google Scholar
- 15.A. Servetti and J. C. De Martin. Perception-based selective encryption of G.729 speech. In Proceedings of the 2002 IEEE Internatinal Conference on Acoustics, Speech, and Signal Processing, volume 1, pages 621–624, Orlando, Florida, USA, May 13–17, 2002.Google Scholar
- 16.C. E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28:656–715, October 1949.Google Scholar
- 17.C. Shi and B. Bhargava. An efficient MPEG video encryption algorithm. In Proceedings of the Workshop on Security in Large-Scale Distributed Systems, pages 381–386, West Lafayette, Indiana, USA, October 20–22, 1998.Google Scholar
- 18.Sony Electronics. Passage: Freedom to choose, February 10 2003. http://www.sonypassage.com/features.htm.
- 19.G. A. Spanos and T. B. Maples. Performance study of a selective encryption scheme for security of networked, real-time video. In Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN'95), pages 72–78, Las Vegas, Nevada, USA, September 1995.Google Scholar
- 22.U.S. Department of Defense. Trusted computer system evaluation criteria (TCSEC). DoD 5200.28-STD, December 1985.Google Scholar