Title :
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks
Author :
Katti, Raj S. ; Srinivasan, Sudarshan K. ; Vosoughi, Aida
Author_Institution :
Dept. of Electr. & Comput. Eng., North Dakota State Univ., Fargo, ND, USA
fDate :
3/1/2011 12:00:00 AM
Abstract :
Modifications of arithmetic coding (AC) have been proposed to improve the security of traditional AC. Two main modifications to AC are randomized AC (RAC) and AC with key-based interval splitting (KSAC). Chosen-plaintext attacks have been proposed for these two methods when the same key is used to encrypt different messages. We first give a definition for security of encryption using AC that is based on the inability of the adversary to distinguish between the encryption of one plaintext from the encryption of another. Using this definition, we prove that RAC is insecure even if a new random key is used to compress every message. Our proof assumes that the adversary can only eavesdrop on the ciphertext and cannot request encryptions of chosen-plaintexts. We then prove that the method of first-compress-then-encrypt, where the encryption is performed by a bitwise xor of the compressed output with a pseudorandom bit sequence, is provably secure with respect to chosen-plaintext attacks. If the pseudorandom bit sequence is derived in advance using Advanced Encryption Standard (AES) in the counter mode, then the first-compress-then-encrypt method results in a performance penalty of only a few two input xor-gate delays.
Keywords :
arithmetic codes; cryptography; logic gates; random sequences; randomised algorithms; XOR gate delay; advanced encryption standard; bitwise XOR; chosen plaintext attack; ciphertext only attack; compressed output; counter mode; encryption security; first-compress-then-encrypt method; key based interval splitting; pseudorandom bit sequence; randomized AC; randomized arithmetic codes security; Arithmetic codes; cryptanalysis; multimedia encryption; randomized arithmetic coding;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2010.2096809