1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008.

Slides:



Advertisements
Similar presentations
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Advertisements

International Data Encryption Algorithm
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Arithmetic Coding. Gabriele Monfardini - Corso di Basi di Dati Multimediali a.a How we can do better than Huffman? - I As we have seen, the.
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Block Ciphers and the Data Encryption Standard
Data Compressor---Huffman Encoding and Decoding. Huffman Encoding Compression Typically, in files and messages, Each character requires 1 byte or 8 bits.
Lecture 6: Huffman Code Thinh Nguyen Oregon State University.
Practical Techniques for Searches on Encrypted Data Author: Dawn Xiaodong Song, David Wagner, Adrian Perrig Presenter: 紀銘偉.
ICS 454: Principles of Cryptography
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Indexing and Searching
Lecture 23 Symmetric Encryption
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
CSE 651: Introduction to Network Security
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys Nagoya University, Japan Yuki Asano, Shingo Yanagihara, and Tetsu Iwata ACNS2012, June 28, 2012,
AVALANCHE EFFECT IN THE FAMILY OF BLOCK CIPHERS “SD-(n,k)” University “Ss Cyril and Methodius” – Skopje, RM S. Markovski, PhD A. Mileva, MSc D. Gligoroski,
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
“Implementation of a RC5 block cipher algorithm and implementing an attack on it” Cryptography Team Presentation 1.
Introduction to Modern Symmetric-key Ciphers
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
1 Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai ASIACCS’06, March 21–24, 2006, Taipei,
Lecture 23 Symmetric Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
CS654: Digital Image Analysis Lecture 34: Different Coding Techniques.
Hanyang University Hyunok Oh Energy Optimal Bit Encoding for Flash Memory.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems 片斷視窗編碼法的分析及應用到 ECC IEEE Transactions on Computers,
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
بسم الله الرحمن الرحيم My Project Huffman Code. Introduction Introduction Encoding And Decoding Encoding And Decoding Applications Applications Advantages.
CHAOS CRYPTOGRAPHY Nathaniel Speiser Physics
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
PKCS #5 v2.0: Password-Based Cryptography Standard
NCHU1 The LOCO-I Lossless image Compression Algorithm: Principles and Standardization into JPEG-LS Authors: M. J. Weinberger, G. Seroussi, G. Sapiro Source.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
Information theory Data compression perspective Pasi Fränti
Introduction Applications: Pay-TV, Confidential video conferencing,
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
ATM using fingerprint
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 3: Symmetric Key Encryption
Cryptography after DES
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Unit 2 “Implementation of a RC5 block cipher algorithm and implementing an attack on it”
Cryptography Team Presentation 1
ICS 454: Principles of Cryptography
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
Yongjian Hu, Member, IEEE, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li
International Data Encryption Algorithm
A new chaotic algorithm for image encryption
Efficient Huffman Decoding
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Source: IEEE Transactions on multimedia, Vol. 21, No
Florida State University
Stream Cipher Structure
Presentation transcript:

1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV Kwok-Wo Wong, Senior Member, IEEE, and Ching-Hung Yuen Adviser :鄭錦楸, 郭文中 教授 Reporter :林彥宏

2 Outline Introduction Proposed Approach Encryption Procedures Decryption Procedures Simulation Results Conclusions

3 Introduction(1/4) Entropy coding Arithmetic coding Huffman coding Baptista-type Chaotic cryptosystem One-Dimensional Logistic Map:

4 Introduction(3/4) trajectory

5 Introduction(2/4) S S-1 S-2 S % a b c $ Alphabet unit Sit numberSpacing position

6 Introduction(4/4)

7 Proposed Approach Number of Occurrence for Symbol Map Function Search Mode Mask Mode Huffman Tree Regenerate Chaotic Trajectory Extract Mask Bit Find Out Iteration Number Lookup Table Encryption Decryption Mask Intermediate Sequence

8 Proposed Approach (A,B,C,D)=(0.5, 0.25, 0.125, 0.125) phase space [0, 1] is divided into 256 partitions A=128 B=64 C=32 D=32

9 Proposed Approach more probable symbols are encrypted by searching in the dynamic lookup table less probable symbols are masked by a pseudorandom bitstream

10 Encryption Procedures Step1) Scan the whole plaintext sequence once Step2)

11 Encryption Procedures Step3) encrypt each plaintext symbol sequentially if the number of iterations required is smaller than a preselected maximum value, this symbol is considered as encrypted by the search mode; Otherwise, it will be encrypted by the mask mode eight masking bits are extracted from the least significant byte of the chaotic map output: Step4) after all the plaintext blocks have been processed, a Huffman tree is built for all the collected number of iterations, including zero if intermediate sequence exceeds the plaintext length, this means that no compression is achieved at all; encrypted by the all-mask mode

12 Encryption Procedures

13 Encryption Procedures Step5) binary mask sequence and the intermediate sequence are divided into 32-bit blocks

14 Decryption Procedures key and the plaintext specific information must be delivered to the receiver secretly secret key includes the parameters and the initial value of the chaotic map and also the initial cipher block information includes the name and length of the plaintext file, the encryption mode Step1) using the shared secret parameters and the initial conditions to regenerate the chaotic trajectory extract the mask bits if all-mask mode was used in encryption, the output sequence is already the plaintext; Otherwise, it is the intermediate sequence Step2) Scan the intermediate sequence sequentially find out the number of iterations required nonzero number of iterations and determine the final partition visited by the chaotic trajectory

15 Simulation Results Compression Ratio Encryption and Decryption Speed Key Space and Sensitivity Plaintext Sensitivity

16 Compression Ratio

17 Compression Ratio the compression performance of the second configuration is better for most of the files scheme is not compression-oriented, but is built on a chaotic cryptosystem

18 Encryption and Decryption Speed encryption speed ranges from 684kB/s to 4.81MB/s decryption speed varies from 955 kB/s to 2.37MB/s

19 Key Space and Sensitivity Key Space encryptions using all-mask mode were performed with a small change in only one of the parameters the ciphertext is very sensitive to the key

20 Plaintext Sensitivity The results are 50.00% (bit change at the beginning of plaintext), 50.04% (middle), and 50.01% (end), respectively. They are all close to 50%, which imply that the ciphertext is very sensitive to the plaintext.

21 Conclusions The key space of the proposed cryptosystem is equivalent to 130 bits Simulation results show that all the standard test files are compressed to a satisfactory degree, and the ciphertext is very sensitive to a tiny change in the key or the plaintext the compression capability is achieved while the security is maintained scheme also guarantees that the ciphertext is not longer than the plaintext