Advertisement

Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages

  • Reine Lundin
  • Stefan Lindskog
  • Anna Brunstrom
  • Simone Fischer-Hübner
Part of the Advances in Information Security book series (ADIS, volume 23)

Abstract

In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.

Keywords

Encryption Algorithm Cipher Text Message Space Encrypt Message Selective Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions in Signal Processing, 48(8):2439–2451, August 2000.Google Scholar
  2. 2.
    M. Van Droogenbroeck and R. Benedett. Techniques for a selective encryption of uncom-pressed and compressed images. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS'02), pages 90–97, Ghent, Belgium, September 9–11, 2002.Google Scholar
  3. 3.
    J. Goodman and A. P. Chandrakasan. Low power scalable encryption for wireless systems. Wireless Networks, 4(l):55–70, 1998.CrossRefGoogle Scholar
  4. 4.
    T. Kunkelmann and U. Horn. Video encryption based on data partitioning and scalable coding: A comparison. In T. Plagemann and V. Goebel, editors, Proceedings of the 5th Inter-active Distributed Multimedia Systems and Telecommunication Services (IDMS'98), volume 1483 of Lecture Notes in Computer Science, pages 95–106, Oslo, Norway, September 8–11, 1998. Springer-Verlag.Google Scholar
  5. 5.
    Y. Li, Z. Chen, S. M. Tan, and R. H. Campbell. Security enhanced MPEG player. In Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96), pages 169–176, Berlin, Germany, March 25–26 1996.Google Scholar
  6. 6.
    S. Lindskog and A. Brunstrom. Design and implementation of a tunable encryption service for networked applications. In Proceedings of the First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SecQoS 2005), September 9, 2005. To appear.Google Scholar
  7. 7.
    T. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Communications Magazine, 42(5): 124–129, May 2004.Google Scholar
  8. 8.
    K.-w. Lye and J. Wing. Game strategies in network security. In Proceedings of Foundations of Computer Security, Copenhagen, Denmark, July 25–26, 2002.Google Scholar
  9. 9.
    J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.
  10. 10.
    Alec D. E. Muffett. Crack: A sensible passward checker for UNIX, 1992.Google Scholar
  11. 12.
    J. O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD thesis, University of Minnesota, Minnesota, USA, 1999.Google Scholar
  12. 13.
    M. Podesser, H. P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmission of image data in mobile environments. In Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG '02), Tromsø/Trondheim, Norway, October 4–6, 2002.Google Scholar
  13. 14.
    K. Sallhammar and S. J. Knapskog. Using game theory in stochastic models for quantifying security. In Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), Espoo, Finland, November 4–5, 2004.Google Scholar
  14. 15.
    A. Servetti and J. C. De Martin. Perception-based selective encryption of G.729 speech. In Proceedings of the 2002 IEEE Internatinal Conference on Acoustics, Speech, and Signal Processing, volume 1, pages 621–624, Orlando, Florida, USA, May 13–17, 2002.Google Scholar
  15. 16.
    C. E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28:656–715, October 1949.Google Scholar
  16. 17.
    C. Shi and B. Bhargava. An efficient MPEG video encryption algorithm. In Proceedings of the Workshop on Security in Large-Scale Distributed Systems, pages 381–386, West Lafayette, Indiana, USA, October 20–22, 1998.Google Scholar
  17. 18.
    Sony Electronics. Passage: Freedom to choose, February 10 2003. http://www.sonypassage.com/features.htm.
  18. 19.
    G. A. Spanos and T. B. Maples. Performance study of a selective encryption scheme for security of networked, real-time video. In Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN'95), pages 72–78, Las Vegas, Nevada, USA, September 1995.Google Scholar
  19. 21.
    L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pages 219–229, Boston, Massachusetts, USA, November 1996.CrossRefGoogle Scholar
  20. 22.
    U.S. Department of Defense. Trusted computer system evaluation criteria (TCSEC). DoD 5200.28-STD, December 1985.Google Scholar

Copyright information

© Springer Science+Business Media, LLC. 2006

Authors and Affiliations

  • Reine Lundin
    • 1
  • Stefan Lindskog
    • 1
  • Anna Brunstrom
  • Simone Fischer-Hübner
    • 1
  1. 1.Department of Computer ScienceKarlstad UniversitySweden

Personalised recommendations