资源描述:
《Perturbation meets key-based interval splitting arithmetic coding_ security enhancement and chaos generalization英文》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、SECURITYANDCOMMUNICATIONNETWORKSSecurityComm.Networks2016;9:4353Publishedonline6October2015inWileyOnlineLibrary(wileyonlinelibrary.com).DOI:10.1002/sec.1378RESEARCHARTICLEPerturbationmeetskey-basedintervalsplittingarithmeticcoding:securityenhancementandchaosgeneralizationY
2、ushuZhang1,DiXiao2*,Kwok-WoWong3,JiantaoZhou4,SenBai5andMotingSu61SchoolofElectronicsandInformationEngineering,SouthwestUniversity,Chongqing400715,China2CollegeofComputerScience,ChongqingUniversity,Chongqing400044,China3DepartmentofElectronicEngineering,CityUniversityofHon
3、gKong,Kowloon,HongKong4DepartmentofComputerandInformationScience,FacultyofScienceandTechnology,UniversityofMacau,Taipa,Macau5DepartmentofInformationEngineering,ChongqingCommunicationInstitute,Chongqing400035,China6SchoolofEconomicsandBusinessAdministration,ChongqingUnivers
4、ity,Chongqing400044,ChinaABSTRACTKey-basedintervalsplittingarithmeticcoding(KAC)possessesbothencryptionandcompressioncapabilities.However,itpossessesvulnerabilitytochosen-plaintextattackbecausetheattackercanexploretherelationshipbetweenthekeyandthecodewordtodeducethesecret
5、key.Inordertoresistthisattack,weproposetointroduceperturbationintoKAC.Theperturbation-basedKACnotonlyavoidstheflawofKACthatthesplittingkeysareusuallylocatedattheendpointofcertaincodewordorattheborderoftwocodewordsbutalsoremovestherestrictionthatthekeysareonlyallowedincertai
6、nsub-intervals,whichresultingreatconveniencetothekeyscheduler.Inaddition,basedongeneralizedarithmeticcodingusingGeneralizedLuröthSeries,westudythephase-spacesplittingofachaoticmapforgeneralizedKACandsuggestthegeneralizedperturbation-basedKAC.Thisleadstothedesignofajointcom
7、pressionandencryptionschemewithmorepowerfulcryptographicfeatures.Copyright©2015JohnWiley&Sons,Ltd.KEYWORDSarithmeticcoding;perturbation;jointcompressionandencryption;chaoticmap*CorrespondenceDiXiao,CollegeofComputerScience,ChongqingUniversity,Chongqing400044,China.E-mail:x
8、iaodi_cqu@hotmail.com1.INTRODUCTIONdemonstratedtheinsecurityofRAContheassumptionthattheat