Security using Shannon-Fano-Elias codes

In this paper we propose using the compression method, Shannon-Fano-Elias coding, for encryption. Shannon-Fano-Elias codes lend themselves for encryption because code-words depend on the order in which the symbols that need to be coded are written and it does not matter if the probability mass function of the symbols is known to everyone. If there are n symbols then there are n! orderings, each leading to a new code. Using an ordering as a key for encryption for small n leads to a weak encryption scheme. We therefore propose a new scheme called adaptive Shannon-Fano-Elias code that makes the complexity of attacks exponential in m, where m is the length of the string being compressed. Since m is usually very large (≫ 220), the security of our scheme is very high. The main reason why our scheme's security depends on m is the fact that all attacks require the ciphertext to be scanned from left to right.

[1]  D. Huffman A Method for the Construction of Minimum-Redundancy Codes , 1952 .

[2]  Jörg Henkel,et al.  Cypress: compression and encryption of data and code for embedded multimedia systems , 2004, IEEE Design & Test of Computers.

[3]  Xiaoyu Ruan,et al.  Cryptanalysis of Shannon-Fano-Elias codes , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[4]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[5]  Ruedi Seiler,et al.  Segmentation and compression of documents with JPEG2000 , 2003, IEEE Trans. Consumer Electron..

[6]  Ronald L. Rivest,et al.  On breaking a Huffman code , 1996, IEEE Trans. Inf. Theory.

[7]  Xiaoyu Ruan,et al.  Using Improved Shannon-Fano-Elias Codes for Data Encryption , 2006, 2006 IEEE International Symposium on Information Theory.

[8]  Xiaoyu Ruan,et al.  Reducing the Length of Shannon-Fano-Elias Codes and Shannon-Fano Codes , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[9]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[10]  J. Gerard Wolff,et al.  Computing as Information Compression by Multiple Alignment, Unification and Search , 2003, J. Univers. Comput. Sci..