Spelling suggestions: "subject:"[een] HOMOPHONIC SUBSTITUTION"" "subject:"[enn] HOMOPHONIC SUBSTITUTION""
1 |
[en] CRYPTO-COMPRESSION PREFIX CODING / [pt] CODIFICAÇÃO LIVRE DE PREFIXO PARA CRIPTO-COMPRESSÃOCLAUDIO GOMES DE MELLO 16 May 2007 (has links)
[pt] Cifragem e compressão de dados são funcionalidades
essencias quando dados digitais são armazenados ou
transmitidos através de canais inseguros. Geralmente,
duas
operações sequencias são aplicadas: primeiro, compressão
de dados para economizar espaço de armazenamento e
reduzir
custos de transmissão, segundo, cifragem de dados para
prover confidencialidade. Essa solução funciona bem para
a
maioria das aplicações, mas é necessário executar duas
operações caras, e para acessar os dados, é necessário
primeiro decifrar e depois descomprimir todo o texto
cifrado para recuperar a informação. Neste trabalho são
propostos algoritmos que realizam tanto compressão como
cifragem de dados. A primeira contribuição desta tese é
o
algoritmo ADDNULLS - Inserção Seletiva de Nulos. Este
algoritmo usa a técnica da esteganografia para esconder
os
símbolos codificados em símbolos falsos. É baseado na
inserção seletiva de um número variável de símbolos
nulos
após os símbolos codificados. É mostrado que as perdas
nas
taxas de compressão são relativamente pequenas. A
segunda
contribuição desta tese é o algoritmo HHC - Huffman
Homofônico-Canônico. Este algoritmo cria uma nova árvore
homofônica baseada na árvore de Huffman canônica
original
para o texto de entrada. Os resultados dos experimentos
são mostrados. A terceira contribuição desta tese é o
algoritmo RHUFF - Huffman Randomizado. Este algoritmo
é
uma variante do algoritmo de Huffman que define um
procedimento de cripto-compressão que aleatoriza a
saída.
O objetivo é gerar textos cifrados aleatórios como saída
para obscurecer as redundâncias do texto original
(confusão). O algoritmo possui uma função de permutação
inicial, que dissipa a redundância do texto original
pelo
texto cifrado (difusão). A quarta contribuição desta
tese
é o algoritmo HSPC2 - Códigos de Prefixo baseados em
Substituição Homofônica com 2 homofônicos. No processo
de
codificação, o algoritmo adiciona um bit de sufixo em
alguns códigos. Uma chave secreta e uma taxa de
homofônicos são parâmetros que controlam essa inserção.
É
mostrado que a quebra do HSPC2 é um problema NP-
Completo. / [en] Data compression and encryption are essential features
when digital
data is stored or transmitted over insecure channels.
Usually, we apply
two sequential operations: first, we apply data compression
to save disk
space and to reduce transmission costs, and second, data
encryption to
provide confidentiality. This solution works fine for most
applications,
but we have to execute two expensive operations, and if we
want to
access data, we must first decipher and then decompress the
ciphertext
to restore information. In this work we propose algorithms
that achieve
both compressed and encrypted data. The first contribution
of this thesis is
the algorithm ADDNULLS - Selective Addition of Nulls. This
algorithm
uses steganographic technique to hide the real symbols of
the encoded
text within fake ones. It is based on selective insertion
of a variable
number of null symbols after the real ones. It is shown
that coding and
decoding rates loss are small. The disadvantage is
ciphertext expansion. The
second contribution of this thesis is the algorithm HHC -
Homophonic-
Canonic Huffman. This algorithm creates a new homophonic
tree based
upon the original canonical Huffman tree for the input
text. It is shown the
results of the experiments. Adding security has not
significantly decreased
performance. The third contribution of this thesis is the
algorithm RHUFF
- Randomized Huffman. This algorithm is a variant of
Huffman codes that
defines a crypto-compression algorithm that randomizes
output. The goal
is to generate random ciphertexts as output to obscure the
redundancies
in the plaintext (confusion). The algorithm uses
homophonic substitution,
canonical Huffman codes and a secret key for ciphering.
The secret key is
based on an initial permutation function, which dissipates
the redundancy of
the plaintext over the ciphertext (diffusion). The fourth
contribution of this
thesis is the algorithm HSPC2 - Homophonic Substitution
Prefix Codes
with 2 homophones. It is proposed a provably secure
algorithm by using
a homophonic substitution algorithm and a key. In the
encoding process,
the HSPC2 function appends a one bit suffx to some codes.
A secret key
and a homophonic rate parameters control this appending.
It is shown that
breaking HSPC2 is an NP-Complete problem.
|
2 |
Universal homophonic codingStevens, Charles Cater 11 1900 (has links)
Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still susceptible to known-plaintext and chosen-plaintext attacks.
The aim of homophonic coding is to convert a plaintext source into a random sequence by randomly mapping each source symbol into one of a set of homophones. Each homophone is then encoded by a source coder after which it can be encrypted with a cryptographic system. The security of homophonic coding falls into the class of unconditionally secure ciphers.
The main advantage of homophonic coding over pure source coding is that it provides security both against known-plaintext and chosen-plaintext attacks, whereas source coding merely protects against a ciphertext-only attack. The aim of this dissertation is to investigate the implementation of an adaptive homophonic coder based on an arithmetic coder. This type of homophonic coding is termed universal, as it is not dependent on the source statistics. / Computer Science / M.Sc. (Computer Science)
|
3 |
Universal homophonic codingStevens, Charles Cater 11 1900 (has links)
Redundancy in plaintext is a fertile source of attack in any encryption system. Compression before encryption reduces the redundancy in the plaintext, but this does not make a cipher more secure. The cipher text is still susceptible to known-plaintext and chosen-plaintext attacks.
The aim of homophonic coding is to convert a plaintext source into a random sequence by randomly mapping each source symbol into one of a set of homophones. Each homophone is then encoded by a source coder after which it can be encrypted with a cryptographic system. The security of homophonic coding falls into the class of unconditionally secure ciphers.
The main advantage of homophonic coding over pure source coding is that it provides security both against known-plaintext and chosen-plaintext attacks, whereas source coding merely protects against a ciphertext-only attack. The aim of this dissertation is to investigate the implementation of an adaptive homophonic coder based on an arithmetic coder. This type of homophonic coding is termed universal, as it is not dependent on the source statistics. / Computer Science / M.Sc. (Computer Science)
|
Page generated in 0.0491 seconds