Augmenting LZ-77 with Authentication and Integrity Assurance Capabilities
Author
M. Atallah, S.lonardi
Tech report number
CERIAS TR 2004-62
Abstract
The formidable dissemination capability allowed by the current network technology makes it increasingly important to devise new methods to ensure authenticity and integrity. Nowadays it is common practice to distribute documents in compressed form. In this paper, we propose a simple variation on the classic LZ-77 algorithm that allows one to hide, within the compressed document,enough information to warrant its authenticity and integrity. The design is based on the unpredictability of a certain class of pseudo-random number generators,in such a way that the hidden data cannot be retrieved in a reasonable amount of time by an attacker (unless the secret bit-string key is known).Since it can still be decompressed by the original LZ-77 algorithm,the embedding is completely
Journal
Concurrency and Computation: Practice and Experience
Publisher
John Wiley & Sons, Ltd.
Publication Date
2004-01-01
Contents
1.INTRODUCTION
2.HIDING MESSAGES IN LZ-77
3.SECURITY
4.AUTHENTICITY AND INTEGRITY
5.EXPERIMENTAL RESULTS
6.CONCLUSIONS
Copyright
2004 John Wiley & Sons, Ltd.
Location
A hard-copy of this is in the CERIAS Library
Subject
authentication; integrity;data compression; LZ-77; fragile watermark