Subspace-Based Encryption

The use of signal processing in the field of cryptography is an attractive approach in the recent years. As an example, the concept of Blind Source Separation (BSS) has been used for speech encryption. However, some weaknesses of this proposal from a cryptographic point of view have been observed. This chapter proposes to bypass the weaknesses, from a security point of view, of such encryption schemes based on blind source separation techniques by using vectorial subspace concepts. This leads to the proposal of new subspace-based encryption systems. The new subspace-based encryption method together with its iterative version are designed and analyzed in terms of security robustness and quality of recovered signals. Security analysis is conducted using cryptanalysis attacks, whereas quality assessment is achieved using both objective and subjective tools. The proposed subspace-based encryption system is applied for speech and images. Experimental results show an enhancement in the performances beside some interesting and specific features, from a cryptographic point of view, brought by the proposed encryption system.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[3]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[4]  Hualou Liang,et al.  Blind Source Separation-Based Encryption of Images and Speeches , 2005, ISNN.

[5]  Christopher Swenson Modern cryptanalysis - techniques for advanced code breaking , 2008 .

[6]  A. Rukhin,et al.  Statistical Testing of Random Number Generators , 1999 .

[7]  Atef Mermoul An iterative speech encryption scheme based on subspace technique , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Matthew J. B. Robshaw,et al.  Algebraic aspects of the advanced encryption standard , 2006 .

[10]  Guanrong Chen,et al.  Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[11]  Adel Belouchrani Jean-Fran,et al.  Maximum likelihood source separation for discrete sources , 2007 .

[12]  Christian Jutten,et al.  On underdetermined source separation , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[13]  Abdeldjalil Aïssa-El-Bey,et al.  Underdetermined Blind Separation of Nondisjoint Sources in the Time-Frequency Domain , 2007, IEEE Transactions on Signal Processing.

[14]  Lin Qiuhua,et al.  Image cryptosystems based on blind source separation , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.

[15]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[16]  Adel Belouchrani,et al.  A subspace-based method for speech encryption , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).

[17]  Qiu-Hua Lin,et al.  Secure image communication using blind source separation , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[18]  Andrzej Cichocki,et al.  Hidden image separation from incomplete image mixtures by independent component analysis , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[19]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[20]  Hualou Liang,et al.  A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[21]  Hualou Liang,et al.  A Fast Decryption Algorithm for BSS-Based Image Encryption , 2006, ISNN.

[22]  Adel Belouchrani,et al.  Subspace-based technique for speech encryption , 2012, Digit. Signal Process..

[23]  Guanrong Chen,et al.  Cryptanalysis of an Encryption Scheme Based on Blind Source Separation , 2006, ArXiv.

[24]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[25]  Fu-Liang Yin,et al.  Blind source separation applied to image cryptosystems with dual encryption , 2002 .

[26]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[27]  Ueli Maurer,et al.  A universal statistical test for random bit generators , 1990, Journal of Cryptology.

[28]  Peter C. Gutmann Cryptographic Security Architecture: Design and Verification , 2003 .