Cryptanalysis of a data security protection scheme for VoIP
Li, CQ, Li, SJ, Zhang, D and Chen, G (2006) Cryptanalysis of a data security protection scheme for VoIP IEE Proceedings-Vision, Image & Signal Processing, 153 (1). 1 - 10. ISSN 1350-245X
|PDF - Accepted Version |
Available under License : See the attached licence file.
Official URL: http://dx.doi.org/10.1049/ip-vis:20045234
A voice-over-Internet protocol technique with a new hierarchical data security protection (HDSP) scheme using a secret chaotic bit sequence has been recently proposed. Some insecure properties of the HDSP scheme are pointed out and then used to develop known/chosen-plaintext attacks. The main findings are: given n known plaintexts, about (100–(50/2n))% of secret chaotic bits can be uniquely determined; given only one specially-chosen plaintext, all secret chaotic bits can be uniquely derived; and the secret key can be derived with practically small computational complexity when only one plaintext is known (or chosen). These facts reveal that HDSP is very weak against known/chosen-plaintext attacks. Experiments are given to show the feasibility of the proposed attacks. It is also found that the security of HDSP against the brute-force attack is not practically strong. Some countermeasures are discussed for enhancing the security of HDSP and several basic principles are suggested for the design of a secure encryption scheme.
|Additional Information:||This paper is a postprint of a paper submitted to and accepted for publication in IEE Proceedings-Vision, Image & Signal Processing and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at IET Digital Library.|
|Divisions:||Faculty of Engineering and Physical Sciences > Computing Science|
|Deposited By:||Symplectic Elements|
|Deposited On:||11 May 2012 20:43|
|Last Modified:||07 Apr 2013 14:34|
Repository Staff Only: item control page