首页    期刊浏览 2024年07月05日 星期五
登录注册

文章基本信息

  • 标题:Security Analysis of Speech Perceptual Hashing Authentication Algorithm
  • 本地全文:下载
  • 作者:Zhang Qiu-yu ; Ren Zhan-wei ; Xing Peng-fei
  • 期刊名称:International Journal of Security and Its Applications
  • 印刷版ISSN:1738-9976
  • 出版年度:2016
  • 卷号:10
  • 期号:1
  • 页码:103-118
  • DOI:10.14257/ijsia.2016.10.1.11
  • 出版社:SERSC
  • 摘要:Speech perceptual hashing authentication algorithm is an efficient method for content integrity authentication and identity authentication. But the algorithm becomes transparent under the principle of Kerckhoffs which makes the algorithm unsafe. In this paper, the algorithm is encrypted under the principle of Kerckhoffs to protect the security of the algorithm. Then the specific link that won't affect the performance of the algorithm is identified through the experiments. Next, this paper analyzes the security of the encrypted algorithm based on the concept of Shannon unicity distance. The unicity distance is figured out finally based on the experiments. That is to say, the algorithm loses its security even though the algorithm has been encrypted. Under this circumstances, the most important thing is to continue keeping the safety of the algorithm. Therefore, this paper proposed an efficient random secret key method to guarantee the safety of the algorithm after the unicity distance is figured out.
  • 关键词:Speech authentication; Speech perceptual hashing; Unicity distance; Secret ; k ey; Security analysis
国家哲学社会科学文献中心版权所有