TY - GEN
T1 - Security of compressing encrypted sources
AU - Jakimoski, G.
AU - Subbalakshmi, K. P.
PY - 2007
Y1 - 2007
N2 - When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress crypto systems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
AB - When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress crypto systems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
UR - http://www.scopus.com/inward/record.url?scp=50249103322&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=50249103322&partnerID=8YFLogxK
U2 - 10.1109/ACSSC.2007.4487349
DO - 10.1109/ACSSC.2007.4487349
M3 - Conference contribution
AN - SCOPUS:50249103322
SN - 9781424421107
T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers
SP - 901
EP - 903
BT - Conference Record of the 41st Asilomar Conference on Signals, Systems and Computers, ACSSC
T2 - 41st Asilomar Conference on Signals, Systems and Computers, ACSSC
Y2 - 4 November 2007 through 7 November 2007
ER -