1 embedding compression in chaos- based cryptography 嵌入壓縮功能到混亂加密法 ieee...
TRANSCRIPT
![Page 1: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/1.jpg)
1
Embedding Compression in Chaos-Based Cryptography嵌入壓縮功能到混亂加密法
IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008
Kwok-Wo Wong, Senior Member, IEEE, and Ching-Hung Yuen
Adviser:鄭錦楸 , 郭文中 教授 Reporter:林彥宏
![Page 2: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/2.jpg)
2
Outline
Introduction
Proposed ApproachEncryption Procedures
Decryption Procedures
Simulation Results
Conclusions
![Page 3: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/3.jpg)
3
Introduction(1/4)
Entropy codingArithmetic coding
Huffman coding
Baptista-type Chaotic cryptosystem
One-Dimensional Logistic Map:
)1(1 nnn XbXX
]1 ,0[nX
![Page 4: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/4.jpg)
4
Introduction(3/4)
trajectory
![Page 5: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/5.jpg)
5
Introduction(2/4)
SXmin
1)-(SXmin
2)-(SXmin
S
S-1
S-2
S-3
.
.
.
4
3
2
1%
a
b
c
$
#
@
.
Alphabet unit Sit number
3)-(SXmin
minX
minX
2Xmin
3Xmin
4Xmin
4)-(SXmin
Spacing position
SX ,1)-(SX minmin
S
X-X minmax
![Page 6: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/6.jpg)
6
Introduction(4/4)
3626420.44486572X
4471360.44160905X
4471360.44160905X
)X-(1bXX iteration
0000000.23232300X
0000000.44609375 000000,0.44375000interval i
0000000.44375000 000000,0.44140625
0.002343751040.2 ,0.002343751)-(1040.2intervalh
105ACII i
104ACIIh
50.000234370.2)/256-(0.8
256S , 0.8]X 0.2,[Xlimit , 8.3
hi :EX
364
'0
1713
nn1n
0
maxmin
b
![Page 7: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/7.jpg)
7
Proposed Approach
Number of Occurrence for
SymbolMap Function
Search Mode
Mask Mode
Huffman Tree
Regenerate Chaotic
TrajectoryExtract Mask Bit
Find Out Iteration Number
Lookup Table
Encryption
Decryption
MaskIntermediate
Sequence
![Page 8: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/8.jpg)
8
Proposed Approach
(A,B,C,D)=(0.5 , 0.25 , 0.125 , 0.125)
phase space [0 , 1] is divided into 256 partitions
A=128 B=64 C=32 D=32
![Page 9: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/9.jpg)
9
Proposed Approach
more probable symbols are encrypted by searching in the dynamic lookup table
less probable symbols are masked by a pseudorandom bitstream
![Page 10: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/10.jpg)
10
Encryption Procedures
Step1) Scan the whole plaintext sequence once
Step2)M,...s,ss 21
1)
))
1
M
ii
jj
u(s
u(sNn(s
jj su(s symbol tomapped occurrence ofnumber theis )
jj sn(s symbol tomappedpartition ofnumber theis )
MNN ,number partitions theis
.
.
.
.
.
0
1
1s2s3s
Ms
![Page 11: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/11.jpg)
11
Encryption Procedures
Step3) encrypt each plaintext symbol sequentiallyif the number of iterations required is smaller than a preselected maximum value, this symbol is considered as encrypted by the search mode; Otherwise, it will be encrypted by the mask mode
eight masking bits are extracted from the least significant byte of the chaotic map output:
Step4) after all the plaintext blocks have been processed, a Huffman tree is built for all the collected number of iterations, including zero
if intermediate sequence exceeds the plaintext length, this means that no compression is achieved at all; encrypted by the all-mask mode
5251504948474645525121 bbbbbbbb0 b...bbb
![Page 12: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/12.jpg)
12
Encryption Procedures
![Page 13: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/13.jpg)
13
Encryption Procedures
Step5) binary mask sequence and the intermediate sequence are divided into 32-bit blocks
3214mod11 2 mod )
1 i-)(L/ircii c m(rci-
bits maskingeight are
bytesin length plaintext theis
sequences teintermedia in theblock bit -32ith theare
ciphertext in theblock bit -32ith theare
i
i
i
m
L
r
c
![Page 14: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/14.jpg)
14
Decryption Procedures
key and the plaintext specific information must be delivered to the receiver secretly
secret key includes the parameters and the initial value of the chaotic map and also the initial cipher block
information includes the name and length of the plaintext file, the encryption mode
Step1) using the shared secret parameters and the initial conditions to regenerate the chaotic trajectory
extract the mask bitsif all-mask mode was used in encryption, the output sequence is already the plaintext; Otherwise, it is the intermediate sequence
Step2) Scan the intermediate sequence sequentiallyfind out the number of iterations requirednonzero number of iterations and determine the final partition visited by the chaotic trajectory
![Page 15: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/15.jpg)
15
Simulation Results
Compression Ratio
Encryption and Decryption Speed
Key Space and Sensitivity
Plaintext Sensitivity
)11 nnn -x(bxx
256 into divide is space phase
0.3388, , 13.99999999b 0 x
![Page 16: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/16.jpg)
16
Compression Ratio
![Page 17: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/17.jpg)
17
Compression Ratio
the compression performance of the second configuration is better for most of the files
scheme is not compression-oriented, but is built on a chaotic cryptosystem
100%LengthPlaintext
Length CiphertextR
![Page 18: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/18.jpg)
18
Encryption and Decryption Speed
encryption speed
ranges from 684kB/s
to 4.81MB/s
decryption speed
varies from 955 kB/s
to 2.37MB/s
![Page 19: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/19.jpg)
19
Key Space and Sensitivity
Key Space
encryptions using all-mask mode were performed with a small change in only one of the parameters
the ciphertext is very sensitive to the key
130bits324652
32bitsc , 52bits , 46bits 1-0
xb
50.01%, 49.97% , 50.05% 1-0 cxb
![Page 20: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/20.jpg)
20
Plaintext Sensitivity
The results are 50.00% (bit change at the beginning of plaintext), 50.04% (middle), and 50.01% (end), respectively.
They are all close to 50%, which imply that the ciphertext is very sensitive to the plaintext.
![Page 21: 1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV. 2008](https://reader036.vdocuments.pub/reader036/viewer/2022062423/56649ef65503460f94c0989d/html5/thumbnails/21.jpg)
21
Conclusions
The key space of the proposed cryptosystem is equivalent to 130 bits
Simulation results show that all the standard test files are compressed to a satisfactory degree, and the ciphertext is very sensitive to a tiny change in the key or the plaintext
the compression capability is achieved while the security is maintained
scheme also guarantees that the ciphertext is not longer than the plaintext