Advanced Search

ISSN1001-3806 CN51-1125/TN Map

Volume 38 Issue 4
May  2014
Article Contents
Turn off MathJax

Citation:

Known-public key attack on asymmetric optical image cryptosystem

  • Received Date: 2013-08-19
    Accepted Date: 2013-09-27
  • In order to break the asymmetric optical image cryptosystem based on phase-truncated Fourier transforms, known-public key attack method was proposed. Through theoretical analysis and experimental simulation, an attacker can get the general decryption key, recover the plaintext of asymmetric optical image encryption system based on phase truncation Fourier transform and achieve the good crack effect under the known public key attack. During the whole attack process, the method needs anything except for the public keys and the difficulty of implementation is also reduced. The results show this method has the practical significance.
  • 加载中
  • [1]

    REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995, 20(7):767-769.
    [2]

    SITU G H, ZHANG J J. Double random phase encoding in the Fresnel domain [J]. Optics Letters, 2004, 29(14):1584-1586.
    [3]

    LIN R, LIU Q N, ZHANG C L. A new fast algorithm for gyrator transform [J]. Laser Technology, 2012, 36(1):50-53(in Chin-ese).
    [4]

    WANG X G, ZHAO D M, CHEN L F. Image encryption based on extended fractional Fourier transform and digital holography technique[J]. Optics Communications, 2006, 260(2): 449-453.
    [5]

    HWANG H E, CHANG H T, LIE W N. Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J]. Optics Express, 2009, 17(16):13700-13710.
    [6]

    DENG X P, ZHAO D M. Multiple-image encryption using phase retrieve algorithm and inter-modulation in Fourier domain[J].Optics and Laser Technology, 2012, 44(2):374-377.
    [7]

    HENNELLY B, SHERIDANJ T. Optical image encryption by random shifting in fractional Fourier domains [J]. Optics Letters, 2003, 28(4): 269-271.
    [8]

    PENG X, WEI H Zh, ZHANG P. Chosen plaintext attack on double random-phase encoding in the Fresnel domain [J]. Acta Physica Sinica,2007, 56(7):3924-3930 (in Chinese).
    [9]

    PENG X, ZHANG P, WEI H Zh, et al. Known-plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3):1130-1136 (in Chinese).
    [10]

    WEI H Zh, PENG X, ZHANG P, et al. Chosen-Plaintext attack on double phase encoding encryption technique [J]. Acta Optica Sinica,2007,27(5):824-829 (in Chinese).
    [11]

    PENG X, TANG H Q, TIAN J D. Ciphertext-only attack on double random phase encoding optical encryption system [J]. Acta Physica Sinica,2007, 56(5):2629-2636 (in Chinese).
    [12]

    WANG Q, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters, 2010,35(2): 118-120.
    [13]

    DING X L.Asymmetric optifcal image cryptosystem based on spherical wave illumination[J].Laser Technology,2013,37(5):577-581 (in Chinese).
    [14]

    WANG X G, ZHAO D M. A specific attack on the asymmetric cryptosystem based on the phase-truncated Fourier trans-forms [J]. Optics Communications, 2012,285(6):1078-1081.
    [15]

    STALLINGS W. Cryptography and network security: principles and practice [M]. 2nd ed. Upper Saddle River,New Jersey,USA: Prentice Hall, 1999:24-26.
  • 加载中
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Article views(3600) PDF downloads(463) Cited by()

Proportional views

Known-public key attack on asymmetric optical image cryptosystem

  • 1. Department of Physics and Information Engineering, Huaihua College, Huaihua 418008, China

Abstract: In order to break the asymmetric optical image cryptosystem based on phase-truncated Fourier transforms, known-public key attack method was proposed. Through theoretical analysis and experimental simulation, an attacker can get the general decryption key, recover the plaintext of asymmetric optical image encryption system based on phase truncation Fourier transform and achieve the good crack effect under the known public key attack. During the whole attack process, the method needs anything except for the public keys and the difficulty of implementation is also reduced. The results show this method has the practical significance.

Reference (15)

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return