DocumentCode :
3247816
Title :
Security of Compressing Encrypted Sources
Author :
Jakimoski, G. ; Subbalakshmi, K.P.
Author_Institution :
Stevens Inst. of Technol., Hoboken
fYear :
2007
fDate :
4-7 Nov. 2007
Firstpage :
901
Lastpage :
903
Abstract :
When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress cryptosystems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
Keywords :
computational complexity; cryptography; data compression; information theory; complexity theory; encrypt-then-compress cryptosystems; information theory; system security; Compression algorithms; Cryptography; Data privacy; Data security; Information security; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signals, Systems and Computers, 2007. ACSSC 2007. Conference Record of the Forty-First Asilomar Conference on
Conference_Location :
Pacific Grove, CA
ISSN :
1058-6393
Print_ISBN :
978-1-4244-2109-1
Electronic_ISBN :
1058-6393
Type :
conf
DOI :
10.1109/ACSSC.2007.4487349
Filename :
4487349
Link To Document :
بازگشت