40,799 research outputs found
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for
multimedia transmission named "Multimedia Cryptography System" (MCS). No
cryptanalytic results have been reported so far. This paper presents a
differential attack to break MCS, which requires only seven chosen plaintexts.
The complexity of the attack is O(N), where is the size of plaintext.
Experimental results are also given to show the real performance of the
proposed attack.Comment: 22 pages, 5 figure
On the Design of Perceptual MPEG-Video Encryption Algorithms
In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl
Template-based Gravitational-Wave Echoes Search Using Bayesian Model Selection
The ringdown of the gravitational-wave signal from a merger of two black
holes has been suggested as a probe of the structure of the remnant compact
object, which may be more exotic than a black hole. It has been pointed out
that there will be a train of echoes in the late-time ringdown stage for
different types of exotic compact objects. In this paper, we present a
template-based search methodology using Bayesian statistics to search for
echoes of gravitational waves. Evidence for the presence or absence of echoes
in gravitational-wave events can be established by performing Bayesian model
selection. The Occam factor in Bayesian model selection will automatically
penalize the more complicated model that echoes are present in
gravitational-wave strain data because of its higher degree of freedom to fit
the data. We find that the search methodology was able to identify
gravitational-wave echoes with Abedi et al.'s echoes waveform model about 82.3%
of the time in simulated Gaussian noise in the Advanced LIGO and Virgo network
and about 61.1% of the time in real noise in the first observing run of
Advanced LIGO with significance. Analyses using this method are
performed on the data of Advanced LIGO's first observing run, and we find no
statistical significant evidence for the detection of gravitational-wave
echoes. In particular, we find combined evidence of the three events
in Advanced LIGO's first observing run. The analysis technique developed in
this paper is independent of the waveform model used, and can be used with
different parametrized echoes waveform models to provide more realistic
evidence of the existence of echoes from exotic compact objects.Comment: 16 pages, 6 figure
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
Recently Lin et al. proposed a method of using the underdetermined BSS (blind
source separation) problem to realize image and speech encryption. In this
paper, we give a cryptanalysis of this BSS-based encryption and point out that
it is not secure against known/chosen-plaintext attack and chosen-ciphertext
attack. In addition, there exist some other security defects: low sensitivity
to part of the key and the plaintext, a ciphertext-only differential attack,
divide-and-conquer (DAC) attack on part of the key. We also discuss the role of
BSS in Lin et al.'s efforts towards cryptographically secure ciphers.Comment: 8 pages, 10 figures, IEEE forma
- …
