Known-public key attack on asymmetric optical image cryptosystem
-
摘要: 为了破解基于相位截断傅里叶变换的非对称光学图像加密系统,提出一种已知公钥的攻击方法,并通过理论分析和实验仿真进行了研究。结果表明,在已知公钥的攻击下,攻击者可通过获取通用解密密钥恢复基于相位截断傅里叶变换的非对称光学图像加密系统的明文,并取得了较好的破解效果。在整个攻击的实施过程中,除了公开的加密密钥,无需额外的资源,同时攻击难度大大降低,因此更具实际意义。Abstract: In order to break the asymmetric optical image cryptosystem based on phase-truncated Fourier transforms, known-public key attack method was proposed. Through theoretical analysis and experimental simulation, an attacker can get the general decryption key, recover the plaintext of asymmetric optical image encryption system based on phase truncation Fourier transform and achieve the good crack effect under the known public key attack. During the whole attack process, the method needs anything except for the public keys and the difficulty of implementation is also reduced. The results show this method has the practical significance.
-
-
[1] REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7):767-769.
[2] SITU G H, ZHANG J J. Double random phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14):1584-1586.
[3] LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform [J]. Laser Technology, 2012, 36(1):50-53(in Chin-ese).
[4] WANG X G, ZHAO D M, CHEN L F. Image encryption based on extended fractional Fourier transform and digital holography technique[J]. Optics Communications, 2006, 260(2): 449-453.
[5] HWANG H E, CHANG H T, LIE W N. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J]. Optics Express, 2009, 17(16):13700-13710.
[6] DENG X P, ZHAO D M. Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain[J].Optics and Laser Technology, 2012, 44(2):374-377.
[7] HENNELLY B, SHERIDANJ T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269-271.
[8] PENG X, WEI H Zh, ZHANG P. Chosen plaintext attack on double random-phase encoding in the Fresnel domain [J]. Acta Physica Sinica,2007, 56(7):3924-3930 (in Chinese).
[9] PENG X, ZHANG P, WEI H Zh, et al. Known-plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3):1130-1136 (in Chinese).
[10] WEI H Zh, PENG X, ZHANG P, et al. Chosen-Plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica,2007,27(5):824-829 (in Chinese).
[11] PENG X, TANG H Q, TIAN J D. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica,2007, 56(5):2629-2636 (in Chinese).
[12] WANG Q, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010,35(2): 118-120.
[13] DING X L.Asymmetric optifcal image cryptosystem based on spherical wave illumination[J].Laser Technology,2013,37(5):577-581 (in Chinese).
[14] WANG X G, ZHAO D M. A specific attack on the asymmetric cryptosystem based on the phase-truncated Fourier trans-forms [J]. Optics Communications, 2012,285(6):1078-1081.
[15] STALLINGS W. Cryptography and network security: principles and practice [M]. 2nd ed. Upper Saddle River,New Jersey,USA: Prentice Hall, 1999:24-26.
计量
- 文章访问数: 4
- HTML全文浏览量: 0
- PDF下载量: 7