Abstract
A feature that has become desirable for low-power mobile devices with limited computing and energy resources is the ability to select a security configuration in order to create a trade-off between security and other important parameters such as performance and energy consumption. Selective encryption can be used to create this trade-off by only encrypting chosen units of the information. In this paper, we continue the investigation of the confidentiality implications of selective encryption by applying entropy on a generic selective encryption scheme. By using the concept of run-length vector from run-length encoding theory, an expression is derived for entropy of selectively encrypted strings when the number of encrypted substrings, containing one symbol, and the order of the language change.
Chapter PDF
Similar content being viewed by others
References
Cover, T., Thomas, J.: Elements of Information Theory. John Wiley & Sons, New York (1991)
Folland, G.B.: Real Analysis, Modern Techniques and Their Applications. John Wiley & Sons, New York (1999)
Goodman, J., Chandrakasan, A.P.: Low power scalable encryption for wireless systems. Wireless Networks 4(1), 55–70 (1998)
Lindskog, S., Lundin, R., Brunstrom, A.: Middleware support for tunable encryption. In: Proceedings of the 5th International Workshop on Wireless Information Systems, WIS 2006 (May 23, 2006)
Lundin, R., Lindskog, S.: Security implications of selective encryption. In: Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec 2010), Bolzano, Italy (September 15, 2010)
Podesser, M., Schmidt, H.P., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromsø/Trondheim, Norway, October 4-6 (2002)
Shahid, Z., Chaumont, M., Puech, W.: Fast protection of H.264/AVC by selective encryption of CABAC for I & P frames. In: Proceedings of the 17th European Signal Processing Conference (EUSIPCO 2009), Glasgow, Scotland, August 24–28, pp. 2201–2205 (2009)
Shannon, C.E.: Claude Elwood Shannon: Collected Papers. IEEE Press, Piscataway (1993)
Spanos, G.A., Maples, T.B.: Performance study of a selective encryption scheme for security of networked, real-time video. In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN 1995), Las Vegas, Nevada, USA, pp. 72–78 (September 1995)
Su, Z., Jiang, J., Lian, S., Zhang, G., Hu, D.: Hierarchical selective encryption for G.729 speech based on bit sensitivity. Journal of Internet Technology 10(5), 599–608 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lundin, R., Lindskog, S. (2011). Entropy of Selectively Encrypted Strings. In: Ardagna, C.A., Zhou, J. (eds) Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. WISTP 2011. Lecture Notes in Computer Science, vol 6633. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21040-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-21040-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21039-6
Online ISBN: 978-3-642-21040-2
eBook Packages: Computer ScienceComputer Science (R0)