Abstract
This paper investigates the security of arithmetic coding encryption schemes. A classification scheme for arithmetic coding encryption schemes is proposed and a new adaptive brute-force attack is described. Under certain conditions, it is shown that the adaptive brute-force attack is capable of recovering the key. The way in which the arithmetic coding encryption scheme is initialized appears to make a significant difference to the security of the system as a whole. Although there are modes of operation which are resistant to the adaptive brute-force attack, the security of arithmetic coding encryption schemes is not assured. The results are not conclusive, but are biased toward insecurity.
Preview
Unable to display preview. Download preview PDF.
References
T. C. Bell, J. G. Cleary, and I. H. Witten. Text Compression. Prentice-Hall, Englewood Cliffs, NJ, 1990.
H. A. Bergen and J. M. Hogan. Data security in a fixed-model arithmetic coding compression algorithm. Computers & Security, 11:445–461, 1992.
H. A. Bergen and J. M. Hogan. A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Computers & Security, 12:157–167, 1993.
S. A. Irvine, J. G. Cleary, and I. Rinsma-Melchert. The subset sum problem and arithmetic coding, http://lucy.cs.waikato.ac.nz/~sirvine/, September 1995.
D. W. Jones. Application of splay trees to data compression. Communications of the ACM, 31(8):996–1007, August 1988.
M. Nelson. The Data Compression Book. M&T Books, North America, 1991.
R. N. Williams. Adaptive Data Compression. Kluwer Academic Publishers, Norwell, MA, 1991.
I. H. Witten and J. G. Cleary. On the privacy afforded by adaptive text compression. Computers & Security, 7:397–480, 1988.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, J., Boyd, C., Dawson, E. (1997). Cryptanalysis of adaptive arithmetic coding encryption schemes. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027929
Download citation
DOI: https://doi.org/10.1007/BFb0027929
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive