Browse > Article

An Efficient Encryption Scheme Combining PRNG and Permutation for Mobile Multimedia Data  

Han, Jung-Kyu (NTT 정보유통플랫폼연구소)
Cho, Yoo-Kun (서울대학교 전기컴퓨터공학부)
Abstract
In Digital Right Management, symmetric cipher is used for content encryption to reduce encryption cost, AES, advanced encryption standard is usually used to multimedia encryption under desktop environment because of its reasonable security level and computation cost. But mobile handheld device often uses slow speed processor and operates under battery-powered environment. Therefore it requires low computation cost and low energy consumption. This paper proposes new stream cipher scheme which combines pseudo random number generator(PRNG) and dynamically generated permutations. Proposed scheme activates PRNG and generates original key streams. Then it generates extended key streams by applying permutation to original sequence. These extended key streams are XORed with plaintext and generate ciphertext. Proposed scheme reduces the usage of PRNG. Therefore this scheme is fast and consumes less energy in comparison with normal stream cipher. Especially, this scheme shows great speed up (almost 2 times) than normal stream cipher scheme in random access.
Keywords
Multimedia encryption; Stream cipher; Mobile Digital Right Management; Permutation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Soto, 'Statistical Testing of Random Number Generators,' NIST 2000
2 W. Zeng and S. Lei, 'Efficient frequency domain selective scrambling of digital video,' in IEEE Transactions on Multimedia, Vol.5, 2003
3 C. P. Wu and J. Kuo, 'Design of integrated multimedia compression and encryption systems,' in IEEE Transactions on Multimedia, Vol.7, No.5, 2005
4 http://csrc.nist.gov/rng, 'NIST Random Number Generation and Testing'
5 B.Macq and J.j.Quisquater, 'Cryptology for digital tv broadcasting,' in IEEE, Vol.83, No.6, 1995, pp. 944-957e   DOI   ScienceOn
6 W.Stallings, 'Cryptography and Network Security: principles and practices,' 3rd edition Pearson Education Ince
7 A. Muttreja, A. Raghunathan, S. Ravi, and N. K.Jha, 'Hybrid simulation for embedded software energy estimation,' in the 42th Design Automation Conference (DAC05), 2005
8 http://www.poenmobilealliance.org. Open Mobile Alliance
9 D. Xie and C. J. Kuo, 'Multimedia data encryption via random rotation in partitioned bit streams,' 2005
10 A. Muttreja, A. Raghunathan, S. Ravi, and N. K.Jha, 'Automated energy/performance macromodeling of embedded software,' in the 41st Design Automation Conference(DAC04), 2004
11 P. Prasithsangaree and P. Krishnamurthy, 'Analysis of energy consumption of RC4 and aes algorithms in wireless lans',in OLOBECOM 2003, 2003, pp. 1445-1448o
12 D. S. Ravi, A. R. Raghunathan, P. Kocher, and S. Hattangady, 'Security in embedded systems: Design challenges,' in ACM Trans. On Embedded Computing Systems, 3(3), 2004, pp. 461-491   DOI
13 E.T.Lin, A.M.Eskicioglu, R.L.Lagendijk, and E.J.Delp, 'Advances in digital video content protection,' in IEEE vol.93 no.1, 2005
14 R. Wash, 'Lecture Notes on Stream Ciphers and RC4,' 2001. http://www-personal.si.umich.edu/~rwash/pubs/