Advanced Search
DING Xiangling, YUAN Qian, ZHANG Lebing. Known-public key attack on asymmetric optical image cryptosystem[J]. LASER TECHNOLOGY, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025
Citation: DING Xiangling, YUAN Qian, ZHANG Lebing. Known-public key attack on asymmetric optical image cryptosystem[J]. LASER TECHNOLOGY, 2014, 38(4): 561-564. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.025

Known-public key attack on asymmetric optical image cryptosystem

More Information
  • Received Date: August 18, 2013
  • Revised Date: September 26, 2013
  • Published Date: July 24, 2014
  • In order to break the asymmetric optical image cryptosystem based on phase-truncated Fourier transforms, known-public key attack method was proposed. Through theoretical analysis and experimental simulation, an attacker can get the general decryption key, recover the plaintext of asymmetric optical image encryption system based on phase truncation Fourier transform and achieve the good crack effect under the known public key attack. During the whole attack process, the method needs anything except for the public keys and the difficulty of implementation is also reduced. The results show this method has the practical significance.
  • [1]
    REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7):767-769.
    [2]
    SITU G H, ZHANG J J. Double random phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14):1584-1586.
    [3]
    LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform [J]. Laser Technology, 2012, 36(1):50-53(in Chin-ese).
    [4]
    WANG X G, ZHAO D M, CHEN L F. Image encryption based on extended fractional Fourier transform and digital holography technique[J]. Optics Communications, 2006, 260(2): 449-453.
    [5]
    HWANG H E, CHANG H T, LIE W N. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J]. Optics Express, 2009, 17(16):13700-13710.
    [6]
    DENG X P, ZHAO D M. Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain[J].Optics and Laser Technology, 2012, 44(2):374-377.
    [7]
    HENNELLY B, SHERIDANJ T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269-271.
    [8]
    PENG X, WEI H Zh, ZHANG P. Chosen plaintext attack on double random-phase encoding in the Fresnel domain [J]. Acta Physica Sinica,2007, 56(7):3924-3930 (in Chinese).
    [9]
    PENG X, ZHANG P, WEI H Zh, et al. Known-plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3):1130-1136 (in Chinese).
    [10]
    WEI H Zh, PENG X, ZHANG P, et al. Chosen-Plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica,2007,27(5):824-829 (in Chinese).
    [11]
    PENG X, TANG H Q, TIAN J D. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica,2007, 56(5):2629-2636 (in Chinese).
    [12]
    WANG Q, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010,35(2): 118-120.
    [13]
    DING X L.Asymmetric optifcal image cryptosystem based on spherical wave illumination[J].Laser Technology,2013,37(5):577-581 (in Chinese).
    [14]
    WANG X G, ZHAO D M. A specific attack on the asymmetric cryptosystem based on the phase-truncated Fourier trans-forms [J]. Optics Communications, 2012,285(6):1078-1081.
    [15]
    STALLINGS W. Cryptography and network security: principles and practice [M]. 2nd ed. Upper Saddle River,New Jersey,USA: Prentice Hall, 1999:24-26.
  • Related Articles

    [1]LI Shenglin, WANG Huaying. New optical image encryption technology based on grating filter[J]. LASER TECHNOLOGY, 2018, 42(5): 655-658. DOI: 10.7510/jgjs.issn.1001-3806.2018.05.014
    [2]DONG Yingdi, PENG Jinye. Investigation on nonlinear polarization coupling in quantum key distribution[J]. LASER TECHNOLOGY, 2015, 39(6): 756-760. DOI: 10.7510/jgjs.issn.1001-3806.2015.06.005
    [3]LIN Chao, SHEN Xueju, DU Shuang, GUO Yaoyang, HU Shen. Characteristic analysis of encryption and decryption in random polarization optical encryption algorithm[J]. LASER TECHNOLOGY, 2014, 38(4): 515-521. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.016
    [4]DING Xiang-ling. Asymmetric optical image cryptosystem based on spherical wave illumination[J]. LASER TECHNOLOGY, 2013, 37(5): 577-581. DOI: 10.7510/jgjs.issn.1001-3806.2013.05.004
    [5]REN Xiu-yun, CUI Zi-hao, TIAN Zhao-shuo, YANG Jun-guo, LIU Li-bao, FU Shi-you. Key technologies and development of Brillouin LIDAR in ocean telemetry[J]. LASER TECHNOLOGY, 2011, 35(6): 808-812,816. DOI: 10.3969/j.issn.1001-3806.2011.06.023
    [6]XIAO Yong-liang, LIU Qiang, YUAN Sheng, ZHOU Xin, ZHAO Xiao-jun, YANG Ze-hou, CHEN Yong, ZHOU Ding-fu. Study about decryption based on optical image encryption system in the Fresnel domain[J]. LASER TECHNOLOGY, 2009, 33(4): 433-436. DOI: 10.3969/j.issn.1001-3806.2009.04.029
    [7]WEN Shi-feng, SHI Yu-sheng, XIE Jun, CAI Dao-sheng. Study on key technology for 3-D galvanometric scanners[J]. LASER TECHNOLOGY, 2009, 33(4): 377-380. DOI: 10.3969/j.issn.1001-3806.2009.04.012
    [8]Xu Xiaowen, Guo Jin, Yu Qianyang, Fu Youyu, Zhou Jianmin. Key technique of laser range gated imaging[J]. LASER TECHNOLOGY, 2003, 27(6): 603-605.
    [9]Sun Ronglu, Guo lixin, Dong Shangli, Yang Dezhuang. Study on laser cladding of NiCrBSi (Ti)-TiC metal-ceramiccomposite coatings on titanium alloy[J]. LASER TECHNOLOGY, 2001, 25(5): 343-346.
    [10]Li Yi, Zhao Jianping, Zhou Jun, Wang Wei, Ding Zhenya. Fabrication of glass-ceramics window and its optical properties[J]. LASER TECHNOLOGY, 1997, 21(4): 240-243.

Catalog

    Article views (4) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return