On Hiding a Plaintext Length by Preencryption
نویسندگان
چکیده
It is a well known fact that encryption schemes cannot hide a plaintext length when it is unbounded. We thus admit that an approximation of it may leak and we focus on hiding its precise value. Some standards such as TLS or SSH offer to do it by applying some pad-then-encrypt techniques. In this study, we investigate the information leakage when these techniques are used. We define the notion of padding scheme and its associated security. We show that when a padding length is uniformly distributed, the scheme is nearly optimal. We also show that the insecurity degrades linearly with the padding length.
منابع مشابه
Relationship Between Standard Model Plaintext Awareness and Message Hiding
Recently, Bellare and Palacio succeeded in defining the plaintext awareness, which is also called PA2, in the standard model. They propose three valiants of the standard model PA2 named perfect, statistical, and computational PA2. In this paper, we study the relationship between the standard model PA2 and the property about message hiding, that is, IND-CPA. Although it seems that these two are ...
متن کاملA novel data hiding method based on deoxyribonucleic acid coding
The paper proposes a new data hiding method based on deoxyribonucleic acid (DNA) coding, using the Word document as carrier. The plain message becomes a cipher sequence after being encoded to a DNA sequence and encrypted by the addition operation. The cipher sequence is attached to a random DNA primer sequence and circularly shifted for finite times, then hide the whole sequence into a Word doc...
متن کاملPublic Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code
In this paper, we introduce the notion of a Public-Key Encryption (PKE) Scheme that is also a Locally-Decodable Error-Correcting Code. In particular, our construction simultaneously satisfies all of the following properties: • Our Public-Key Encryption is semantically secure under a certain number-theoretic hardness assumption (a specific variant of the Φ-hiding assumption). • Our Public-Key En...
متن کامل“ A Novel Approach of Text Steganography based on null spaces ”
Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Digital Steganography algorithms have been developed by using texts, images and audio etc as the cover media. In this approach, a security model is proposed which imposes the concept of secrecy over privacy for text mess...
متن کاملA Secure Directory Service based on Exclusive Encryption
We describe the design of a Windows file-system directory service that ensures the persistence, integrity, privacy, syntactic legality, and case-insensitive uniqueness of the names it indexes. Byzantine state replication provides persistence and integrity, and encryption imparts privacy. To enforce Windows’ baroque name syntax – including restrictions on allowable characters, on the terminal ch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011