Abstract
In 2007, Kim proposed a secure compression code called the Secure Arithmetic Code (SAC). The code was claimed to be secure against chosen plaintext attacks. However, we find that the SAC is not as secure as the authors have claimed. In this paper, we show the code is prone to two attacks. The first attack completely breaks the code using an adaptive chosen plaintext attack with a polynomial number of queries. The second attack is a ciphertext-only attack, which removes a part of the output permutation.
| Original language | English |
|---|---|
| Pages (from-to) | 781-789 |
| Number of pages | 9 |
| Journal | IEEE Transactions on Information Forensics and Security |
| Volume | 4 |
| Issue number | 4 |
| Early online date | 22 Sept 2009 |
| DOIs | |
| Publication status | Published - Dec 2009 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
User-Defined Keywords
- Arithmetic codes (ACs)
- Communication system security
- Data compression
Fingerprint
Dive into the research topics of 'On the security of the secure arithmetic code'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver