Collision in a phase-only asymmetric cryptosystem based on interference and phase-truncated Fourier transforms

被引:0
|
作者
Y. Xiong
J. Gu
R. Kumar
机构
[1] Jiangnan University,School of Science, Jiangsu Provincial Research Center of Light Industrial Optoelectronic Engineering and Technology
[2] SRM University-AP,Department of Physics
来源
关键词
Security analysis; Asymmetric cryptosystem; Interference; PTFT; Silhouette problem;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, the security strength of a phase-only asymmetric cryptosystem based on interference and phase-truncated Fourier transforms (PTFTs) has been evaluated. Compared to the conventional PTFTs-based scheme where the plaintext is directly encoded into two phase masks (PMs) and the ciphertext, here the plaintext is firstly converted to the phase-only distribution by PTFTs-based encryption process I, and then modulated by the encryption process II with the aid of two masks generated by a carrier image. The security strength of this cryptosystem has been enhanced by an additional secure layer for the output of PTFTs-based structure. Moreover, the four masks generated in the encryption processes I and II are required for the decryption also, it enlarges the key space which further ensures the security strength of the improved cryptosystem. However, we noticed that the carrier image used to generate one of private keys is same as the ciphertext when the input of the encryption is the zero matrix. Thus, the amplitude mask (AM) as the private key could be recovered by the designed chosen-plaintext attack, and then it can be used as the known parameter in the iterative attacks. Employing the recovered mask, two specific attacks with different constraints are designed to break the cryptosystem based on interference and PTFTs successfully. Based on our cryptoanalysis, it is found that most information of the plaintexts were encoded into the AM and the PM in the encryption process I, and silhouette problem would be caused when one of these keys is known. Numerical simulations have been carried out to validate the feasibility and effectiveness of proposed hybrid attacks.
引用
下载
收藏
相关论文
共 50 条
  • [21] Optical cryptosystem based on phase-truncated Fresnel diffraction and transport of intensity equation
    Zhang, Chenggong
    He, Wenqi
    Wu, Jiachen
    Peng, Xiang
    OPTICS EXPRESS, 2015, 23 (07): : 8845 - 8854
  • [22] Cryptanalysis of phase-truncated-Fourier-transforms-based optical cryptosystem using an untrained neural network
    He, Wenqi
    Pan, Shuixin
    Liao, Meihua
    Lu, Dajiang
    Xing, Qi
    Peng, Xiang
    ADVANCED OPTICAL IMAGING TECHNOLOGIES III, 2020, 11549
  • [23] Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform
    Abuturab, Muhammad Rafiq
    APPLIED OPTICS, 2012, 51 (33) : 7994 - 8002
  • [24] Fingerprint matching using phase-only correlation and Fourier-Mellin transforms
    Zhang, Jianxin
    Ou, Zongying
    Wei, Honglei
    ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, 2006, : 379 - +
  • [25] BINARY FOURIER PHASE-ONLY CORRELATION
    NOMURA, T
    ITOH, K
    MATSUOKA, K
    ICHIOKA, Y
    OPTICS LETTERS, 1990, 15 (14) : 810 - 811
  • [26] Collision in Phase Truncation based Asymmetric Cryptosystem in Fresnel Domain
    Mehra, Isha
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    2012 INTERNATIONAL CONFERENCE ON FIBER OPTICS AND PHOTONICS (PHOTONICS), 2012,
  • [27] OPTICAL CORRELATOR PERFORMANCE OF BINARY PHASE-ONLY FILTERS USING FOURIER AND HARTLEY TRANSFORMS
    COTTRELL, DM
    LILLY, RA
    DAVIS, JA
    DAY, T
    APPLIED OPTICS, 1987, 26 (18): : 3755 - 3761
  • [28] Amplitude-phase retrieval attack free cryptosystem based on direct attack to phase-truncated Fourier-transform-based encryption using a random amplitude mask
    Wang, Xiaogang
    Zhao, Daomu
    OPTICS LETTERS, 2013, 38 (18) : 3684 - 3686
  • [29] Asymmetric image encryption using phase-truncated discrete multiple-parameter fractional Fourier transform
    Ren, Guanghui
    Han, Jianan
    Fu, Jiahui
    Shan, Mingguang
    OPTICAL REVIEW, 2018, 25 (06) : 701 - 707
  • [30] Asymmetric image encryption using phase-truncated discrete multiple-parameter fractional Fourier transform
    Guanghui Ren
    Jianan Han
    Jiahui Fu
    Mingguang Shan
    Optical Review, 2018, 25 : 701 - 707