Abstract
In this paper, we start to investigate the security implications of selective encryption. We do this by using the measure guesswork, which gives us the expected number of guesses that an attacker must perform in an optimal brute force attack to reveal an encrypted message. The characteristics of the proposed measure are investigated for zero-order languages. We also introduce the concept of reduction chains to describe how the message (or rather search) space changes for an attacker with different levels of encryption.
Omitting the order of languages, which make it possible to penetrate into encrypted units and even more reduce the message space.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
H. Cheng and X. Li. Partial encryption of compressed images and videos. IEEE Transactions in Signal Processing, 48(8):2439–2451, August 2000.
M. Van Droogenbroeck and R. Benedett. Techniques for a selective encryption of uncom-pressed and compressed images. In Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS'02), pages 90–97, Ghent, Belgium, September 9–11, 2002.
J. Goodman and A. P. Chandrakasan. Low power scalable encryption for wireless systems. Wireless Networks, 4(l):55–70, 1998.
T. Kunkelmann and U. Horn. Video encryption based on data partitioning and scalable coding: A comparison. In T. Plagemann and V. Goebel, editors, Proceedings of the 5th Inter-active Distributed Multimedia Systems and Telecommunication Services (IDMS'98), volume 1483 of Lecture Notes in Computer Science, pages 95–106, Oslo, Norway, September 8–11, 1998. Springer-Verlag.
Y. Li, Z. Chen, S. M. Tan, and R. H. Campbell. Security enhanced MPEG player. In Proceedings of the 1996 International Workshop on Multimedia Software Development (MMSD '96), pages 169–176, Berlin, Germany, March 25–26 1996.
S. Lindskog and A. Brunstrom. Design and implementation of a tunable encryption service for networked applications. In Proceedings of the First IEEE/CREATE-NET Workshop on Security and QoS in Communications Networks (SecQoS 2005), September 9, 2005. To appear.
T. Lookabaugh and D. C. Sicker. Selective encryption for consumer applications. IEEE Communications Magazine, 42(5): 124–129, May 2004.
K.-w. Lye and J. Wing. Game strategies in network security. In Proceedings of Foundations of Computer Security, Copenhagen, Denmark, July 25–26, 2002.
J. Meyer and F. Gadegast. Security mechanisms for multimedia data with the example MPEG-I video, 1995. http://www.gadegast.de/frank/doc/secmeng.pdf.
Alec D. E. Muffett. Crack: A sensible passward checker for UNIX, 1992.
J. O. Pliam. Ciphers and their Products: Group Theory in Private Key Cryptography. PhD thesis, University of Minnesota, Minnesota, USA, 1999.
M. Podesser, H. P. Schmidt, and A. Uhl. Selective bitplane encryption for secure transmission of image data in mobile environments. In Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG '02), Tromsø/Trondheim, Norway, October 4–6, 2002.
K. Sallhammar and S. J. Knapskog. Using game theory in stochastic models for quantifying security. In Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), Espoo, Finland, November 4–5, 2004.
A. Servetti and J. C. De Martin. Perception-based selective encryption of G.729 speech. In Proceedings of the 2002 IEEE Internatinal Conference on Acoustics, Speech, and Signal Processing, volume 1, pages 621–624, Orlando, Florida, USA, May 13–17, 2002.
C. E. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28:656–715, October 1949.
C. Shi and B. Bhargava. An efficient MPEG video encryption algorithm. In Proceedings of the Workshop on Security in Large-Scale Distributed Systems, pages 381–386, West Lafayette, Indiana, USA, October 20–22, 1998.
Sony Electronics. Passage: Freedom to choose, February 10 2003. http://www.sonypassage.com/features.htm.
G. A. Spanos and T. B. Maples. Performance study of a selective encryption scheme for security of networked, real-time video. In Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN'95), pages 72–78, Las Vegas, Nevada, USA, September 1995.
L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the ACM Multimedia 1996, pages 219–229, Boston, Massachusetts, USA, November 1996.
U.S. Department of Defense. Trusted computer system evaluation criteria (TCSEC). DoD 5200.28-STD, December 1985.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer Science+Business Media, LLC.
About this paper
Cite this paper
Lundin, R., Lindskog, S., Brunstrom, A., Fischer-Hübner, S. (2006). Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages. In: Gollmann, D., Massacci, F., Yautsiukhin, A. (eds) Quality of Protection. Advances in Information Security, vol 23. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-36584-8_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-36584-8_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29016-4
Online ISBN: 978-0-387-36584-8
eBook Packages: Computer ScienceComputer Science (R0)