高级检索

非对称光学图像加密系统的已知公钥攻击

丁湘陵, 袁倩, 张乐冰

丁湘陵, 袁倩, 张乐冰. 非对称光学图像加密系统的已知公钥攻击[J]. 激光技术, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025
引用本文: 丁湘陵, 袁倩, 张乐冰. 非对称光学图像加密系统的已知公钥攻击[J]. 激光技术, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025
DING Xiangling, YUAN Qian, ZHANG Lebing. Known-public key attack on asymmetric optical image cryptosystem[J]. LASER TECHNOLOGY, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025
Citation: DING Xiangling, YUAN Qian, ZHANG Lebing. Known-public key attack on asymmetric optical image cryptosystem[J]. LASER TECHNOLOGY, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025

非对称光学图像加密系统的已知公钥攻击

基金项目: 

湖南省教育厅一般项目资助项目(13C715);怀化市创新型人才团队项目资助项目(2012-16;2013-3)

详细信息
    作者简介:

    丁湘陵(1981- ),男,硕士,讲师,主要研究方向为信息光学、数字图像处理、软件形式化方法。E-mail:dingxl1981@163.com

  • 中图分类号: TN911.73

Known-public key attack on asymmetric optical image cryptosystem

  • 摘要: 为了破解基于相位截断傅里叶变换的非对称光学图像加密系统,提出一种已知公钥的攻击方法,并通过理论分析和实验仿真进行了研究。结果表明,在已知公钥的攻击下,攻击者可通过获取通用解密密钥恢复基于相位截断傅里叶变换的非对称光学图像加密系统的明文,并取得了较好的破解效果。在整个攻击的实施过程中,除了公开的加密密钥,无需额外的资源,同时攻击难度大大降低,因此更具实际意义。
    Abstract: In order to break the asymmetric optical image cryptosystem based on phase-truncated Fourier transforms, known-public key attack method was proposed. Through theoretical analysis and experimental simulation, an attacker can get the general decryption key, recover the plaintext of asymmetric optical image encryption system based on phase truncation Fourier transform and achieve the good crack effect under the known public key attack. During the whole attack process, the method needs anything except for the public keys and the difficulty of implementation is also reduced. The results show this method has the practical significance.
  • [1]

    REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7):767-769.

    [2]

    SITU G H, ZHANG J J. Double random phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14):1584-1586.

    [3]

    LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform [J]. Laser Technology, 2012, 36(1):50-53(in Chin-ese).

    [4]

    WANG X G, ZHAO D M, CHEN L F. Image encryption based on extended fractional Fourier transform and digital holography technique[J]. Optics Communications, 2006, 260(2): 449-453.

    [5]

    HWANG H E, CHANG H T, LIE W N. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J]. Optics Express, 2009, 17(16):13700-13710.

    [6]

    DENG X P, ZHAO D M. Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain[J].Optics and Laser Technology, 2012, 44(2):374-377.

    [7]

    HENNELLY B, SHERIDANJ T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269-271.

    [8]

    PENG X, WEI H Zh, ZHANG P. Chosen plaintext attack on double random-phase encoding in the Fresnel domain [J]. Acta Physica Sinica,2007, 56(7):3924-3930 (in Chinese).

    [9]

    PENG X, ZHANG P, WEI H Zh, et al. Known-plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3):1130-1136 (in Chinese).

    [10]

    WEI H Zh, PENG X, ZHANG P, et al. Chosen-Plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica,2007,27(5):824-829 (in Chinese).

    [11]

    PENG X, TANG H Q, TIAN J D. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica,2007, 56(5):2629-2636 (in Chinese).

    [12]

    WANG Q, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010,35(2): 118-120.

    [13]

    DING X L.Asymmetric optifcal image cryptosystem based on spherical wave illumination[J].Laser Technology,2013,37(5):577-581 (in Chinese).

    [14]

    WANG X G, ZHAO D M. A specific attack on the asymmetric cryptosystem based on the phase-truncated Fourier trans-forms [J]. Optics Communications, 2012,285(6):1078-1081.

    [15]

    STALLINGS W. Cryptography and network security: principles and practice [M]. 2nd ed. Upper Saddle River,New Jersey,USA: Prentice Hall, 1999:24-26.

计量
  • 文章访问数:  4
  • HTML全文浏览量:  0
  • PDF下载量:  7
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-08-18
  • 修回日期:  2013-09-26
  • 发布日期:  2014-07-24

目录

    /

    返回文章
    返回