Augmenting LZ-77 with Authentication and Integrity Assurance Capabilities
Download
Author
M. Atallah, S.lonardi
Tech report number
CERIAS TR 2004-62
Entry type
article
Abstract
The formidable dissemination capability allowed by the current network technology makes it increasingly important to devise new methods to ensure authenticity and integrity. Nowadays it is common practice to distribute documents in compressed form. In this paper, we propose a simple variation on the classic LZ-77 algorithm that allows one to hide, within the compressed document,enough information to warrant its authenticity and integrity. The design is based on the unpredictability of a certain class of pseudo-random number generators,in such a way that the hidden data cannot be retrieved in a reasonable amount of time by an attacker (unless the secret bit-string key is known).Since it can still be decompressed by the original LZ-77 algorithm,the embedding is completely
Download
Date
2004
Journal
Concurrency and Computation: Practice and Experience
Key alpha
Atallah
Pages
1063-1076
Publisher
John Wiley & Sons, Ltd.
Volume
16
Publication Date
2004-01-01
Contents
1.INTRODUCTION
2.HIDING MESSAGES IN LZ-77
3.SECURITY
4.AUTHENTICITY AND INTEGRITY
5.EXPERIMENTAL RESULTS
6.CONCLUSIONS
Copyright
2004 John Wiley & Sons, Ltd.
Language
English
Location
A hard-copy of this is in the CERIAS Library
Subject
authentication; integrity;data compression; LZ-77; fragile watermark

