Loading…

Security of Compressing Encrypted Sources

When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of...

Full description

Saved in:
Bibliographic Details
Main Authors: Jakimoski, G., Subbalakshmi, K.P.
Format: Conference Proceeding
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress cryptosystems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
ISSN:1058-6393
2576-2303
DOI:10.1109/ACSSC.2007.4487349