{"title":"数据通信中压缩和加密过程的混沌方法分析","authors":"F. Özkaynak, A. Özer, S. Yavuz","doi":"10.1109/SIU.2012.6204450","DOIUrl":null,"url":null,"abstract":"Data compression and encryption are critical issues for efficiency and security requirements of information transmission. In order to improve the performance and the flexibility of multimedia applications, it is worthwhile to perform compression and encryption in a single process. Recently Hermassi et al. proposed a method for joint compression and encryption using chaotically mutated Huffman trees. The proposed method based on multiple Huffman tables simultaneously performs encryption and compression by a key-controlled swapping of the left and right branches of the Huffman tree. However, security problems were found. In this study describes the security weakness of the proposed method. By applying chosen-plaintext attacks, we show that secret key can be revealed.","PeriodicalId":256154,"journal":{"name":"2012 20th Signal Processing and Communications Applications Conference (SIU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Analysis of chaotic methods for compression and encryption processes in data communication\",\"authors\":\"F. Özkaynak, A. Özer, S. Yavuz\",\"doi\":\"10.1109/SIU.2012.6204450\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data compression and encryption are critical issues for efficiency and security requirements of information transmission. In order to improve the performance and the flexibility of multimedia applications, it is worthwhile to perform compression and encryption in a single process. Recently Hermassi et al. proposed a method for joint compression and encryption using chaotically mutated Huffman trees. The proposed method based on multiple Huffman tables simultaneously performs encryption and compression by a key-controlled swapping of the left and right branches of the Huffman tree. However, security problems were found. In this study describes the security weakness of the proposed method. By applying chosen-plaintext attacks, we show that secret key can be revealed.\",\"PeriodicalId\":256154,\"journal\":{\"name\":\"2012 20th Signal Processing and Communications Applications Conference (SIU)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 20th Signal Processing and Communications Applications Conference (SIU)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIU.2012.6204450\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 20th Signal Processing and Communications Applications Conference (SIU)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIU.2012.6204450","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of chaotic methods for compression and encryption processes in data communication
Data compression and encryption are critical issues for efficiency and security requirements of information transmission. In order to improve the performance and the flexibility of multimedia applications, it is worthwhile to perform compression and encryption in a single process. Recently Hermassi et al. proposed a method for joint compression and encryption using chaotically mutated Huffman trees. The proposed method based on multiple Huffman tables simultaneously performs encryption and compression by a key-controlled swapping of the left and right branches of the Huffman tree. However, security problems were found. In this study describes the security weakness of the proposed method. By applying chosen-plaintext attacks, we show that secret key can be revealed.