Private-key cryptosystem for CD and DVD

被引:0
|
作者
Jiawook, RN [1 ]
机构
[1] Obducat AB, S-20125 Malmo, Sweden
关键词
private-key cryptosystem; algebraic coding; symmetric coding; CD; DVD; optical storage; optical media;
D O I
10.1117/12.330371
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Symmetric code cryptosystems are particularly suitable when large data sets have to be transmitted or stored at high rate. The existing algebraic code based cryptosystems are time consuming and the encoding/decoding speed depends on the key length. They were mainly designed for communications and magnetic media, which have an expected lifetime of up to only a few years. As for transmission there is virtually no lifetime of the transferred information, since the data vanishes by itself. The data that is stored on CD or DVD can not be changed, and must remain secure for the lifetime of the sensitive/classified information or the media, which might extend to 100 years or more. This paper proposes a private-key cryptosystem based on algebraic coding theory, uses a simple code such as Reed-Solomon code. This new approach is ideal for use in optical media applications. It incorporates with the CD and DVD encoding system, and increases the power of the error correction as a by-product. The system appears to be secure and very efficient because of the low overhead for encryption and decryption.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [1] Private-key cryptosystem based on burst-error-correcting codes
    Sun, HM
    [J]. ELECTRONICS LETTERS, 1997, 33 (24) : 2035 - 2036
  • [2] Improving the information rate of a private-key cryptosystem based on product codes
    Sun, HM
    [J]. INFORMATICA, 2002, 13 (01) : 105 - 110
  • [3] A cost-effective private-key cryptosystem for color image encryption
    Lukac, R
    Plataniotis, KN
    [J]. COMPUTATIONAL SCIENCE - ICCS 2005, PT 1, PROCEEDINGS, 2005, 3514 : 679 - 686
  • [4] ARRAY CODES FOR PRIVATE-KEY ENCRYPTION
    DESOUZA, RMC
    DESOUZA, JC
    [J]. ELECTRONICS LETTERS, 1994, 30 (17) : 1394 - 1396
  • [5] Private-Key Hidden Vector Encryption with Key Confidentiality
    Blundo, Cailo
    Iovino, Vincenzo
    Persiano, Giuseppe
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 259 - 277
  • [6] Private-Key Fully Homomorphic Encryption for Private Classification
    Wood, Alexander
    Shpilrain, Vladimir
    Najarian, Kayvan
    Mostashari, Ali
    Kahrobaei, Delaram
    [J]. MATHEMATICAL SOFTWARE - ICMS 2018, 2018, 10931 : 475 - 481
  • [7] On private-key encryption using product codes
    Sun, HM
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (06) : 439 - 450
  • [8] PRIVATE-KEY ALGEBRAIC-CODED CRYPTOSYSTEMS
    RAO, TRN
    NAM, KH
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 35 - 48
  • [9] PRIVATE-KEY ENCRYPTION BASED ON CONCATENATION OF CODES
    ALJABRI, AK
    ALTHUKAIR, F
    MIRZA, A
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 1994, 141 (03): : 105 - 110
  • [10] Function-Private Functional Encryption in the Private-Key Setting
    Brakerski, Zvika
    Segev, Gil
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 306 - 324