Skip to main content

Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages

  • Conference paper
Quality of Protection

Part of the book series: Advances in Information Security ((ADIS,volume 23))

Abstract

In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.

Omitting the order of languages, which make it possible to penetrate into encrypted units and even more reduce the message space.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions in Signal Processing, 48(8):2439–2451, August 2000.

    Google Scholar 

  2. M. Van Droogenbroeck and R. Benedett. Techniques for a selective encryption of uncom-pressed and compressed images. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS'02), pages 90–97, Ghent, Belgium, September 9–11, 2002.

    Google Scholar 

  3. J. Goodman and A. P. Chandrakasan. Low power scalable encryption for wireless systems. Wireless Networks, 4(l):55–70, 1998.

    Article  Google Scholar 

  4. T. Kunkelmann and U. Horn. Video encryption based on data partitioning and scalable coding: A comparison. In T. Plagemann and V. Goebel, editors, Proceedings of the 5th Inter-active Distributed Multimedia Systems and Telecommunication Services (IDMS'98), volume 1483 of Lecture Notes in Computer Science, pages 95–106, Oslo, Norway, September 8–11, 1998. Springer-Verlag.

    Google Scholar 

  5. Y. Li, Z. Chen, S. M. Tan, and R. H. Campbell. Security enhanced MPEG player. In Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96), pages 169–176, Berlin, Germany, March 25–26 1996.

    Google Scholar 

  6. S. Lindskog and A. Brunstrom. Design and implementation of a tunable encryption service for networked applications. In Proceedings of the First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SecQoS 2005), September 9, 2005. To appear.

    Google Scholar 

  7. T. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Communications Magazine, 42(5): 124–129, May 2004.

    Google Scholar 

  8. K.-w. Lye and J. Wing. Game strategies in network security. In Proceedings of Foundations of Computer Security, Copenhagen, Denmark, July 25–26, 2002.

    Google Scholar 

  9. J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.

  10. Alec D. E. Muffett. Crack: A sensible passward checker for UNIX, 1992.

    Google Scholar 

  11. J. O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD thesis, University of Minnesota, Minnesota, USA, 1999.

    Google Scholar 

  12. M. Podesser, H. P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmission of image data in mobile environments. In Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG '02), Tromsø/Trondheim, Norway, October 4–6, 2002.

    Google Scholar 

  13. K. Sallhammar and S. J. Knapskog. Using game theory in stochastic models for quantifying security. In Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), Espoo, Finland, November 4–5, 2004.

    Google Scholar 

  14. A. Servetti and J. C. De Martin. Perception-based selective encryption of G.729 speech. In Proceedings of the 2002 IEEE Internatinal Conference on Acoustics, Speech, and Signal Processing, volume 1, pages 621–624, Orlando, Florida, USA, May 13–17, 2002.

    Google Scholar 

  15. C. E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28:656–715, October 1949.

    Google Scholar 

  16. C. Shi and B. Bhargava. An efficient MPEG video encryption algorithm. In Proceedings of the Workshop on Security in Large-Scale Distributed Systems, pages 381–386, West Lafayette, Indiana, USA, October 20–22, 1998.

    Google Scholar 

  17. Sony Electronics. Passage: Freedom to choose, February 10 2003. http://www.sonypassage.com/features.htm.

  18. G. A. Spanos and T. B. Maples. Performance study of a selective encryption scheme for security of networked, real-time video. In Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN'95), pages 72–78, Las Vegas, Nevada, USA, September 1995.

    Google Scholar 

  19. L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pages 219–229, Boston, Massachusetts, USA, November 1996.

    Chapter  Google Scholar 

  20. U.S. Department of Defense. Trusted computer system evaluation criteria (TCSEC). DoD 5200.28-STD, December 1985.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer Science+Business Media, LLC.

About this paper

Cite this paper

Lundin, R., Lindskog, S., Brunstrom, A., Fischer-Hübner, S. (2006). Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages. In: Gollmann, D., Massacci, F., Yautsiukhin, A. (eds) Quality of Protection. Advances in Information Security, vol 23. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36584-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-36584-8_14

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-29016-4

  • Online ISBN: 978-0-387-36584-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics