Security of compressing encrypted sources

G. Jakimoski, K. P. Subbalakshmi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress crypto systems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).

Original languageEnglish
Title of host publicationConference Record of the 41st Asilomar Conference on Signals, Systems and Computers, ACSSC
Pages901-903
Number of pages3
DOIs
StatePublished - 2007
Event41st Asilomar Conference on Signals, Systems and Computers, ACSSC - Pacific Grove, CA, United States
Duration: 4 Nov 20077 Nov 2007

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Conference

Conference41st Asilomar Conference on Signals, Systems and Computers, ACSSC
Country/TerritoryUnited States
CityPacific Grove, CA
Period4/11/077/11/07

Fingerprint

Dive into the research topics of 'Security of compressing encrypted sources'. Together they form a unique fingerprint.

Cite this