Collision in a phase-only asymmetric cryptosystem based on interference and phase-truncated Fourier transforms

被引:0
|
作者
Y. Xiong
J. Gu
R. Kumar
机构
[1] Jiangnan University,School of Science, Jiangsu Provincial Research Center of Light Industrial Optoelectronic Engineering and Technology
[2] SRM University-AP,Department of Physics
来源
关键词
Security analysis; Asymmetric cryptosystem; Interference; PTFT; Silhouette problem;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, the security strength of a phase-only asymmetric cryptosystem based on interference and phase-truncated Fourier transforms (PTFTs) has been evaluated. Compared to the conventional PTFTs-based scheme where the plaintext is directly encoded into two phase masks (PMs) and the ciphertext, here the plaintext is firstly converted to the phase-only distribution by PTFTs-based encryption process I, and then modulated by the encryption process II with the aid of two masks generated by a carrier image. The security strength of this cryptosystem has been enhanced by an additional secure layer for the output of PTFTs-based structure. Moreover, the four masks generated in the encryption processes I and II are required for the decryption also, it enlarges the key space which further ensures the security strength of the improved cryptosystem. However, we noticed that the carrier image used to generate one of private keys is same as the ciphertext when the input of the encryption is the zero matrix. Thus, the amplitude mask (AM) as the private key could be recovered by the designed chosen-plaintext attack, and then it can be used as the known parameter in the iterative attacks. Employing the recovered mask, two specific attacks with different constraints are designed to break the cryptosystem based on interference and PTFTs successfully. Based on our cryptoanalysis, it is found that most information of the plaintexts were encoded into the AM and the PM in the encryption process I, and silhouette problem would be caused when one of these keys is known. Numerical simulations have been carried out to validate the feasibility and effectiveness of proposed hybrid attacks.
引用
下载
收藏
相关论文
共 50 条
  • [31] Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    APPLIED OPTICS, 2013, 52 (04) : 871 - 878
  • [32] Noise formation in Fourier phase-only holograms
    Georgiou, Andreas
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2010, 27 (12) : 2677 - 2686
  • [33] Optimized iterative method for generating phase-only Fourier hologram based on quadratic phase
    Shen, Chuan
    Qi, Yifei
    Sun, Jiali
    Lv, Shiqi
    Wei, Sui
    OPTICS COMMUNICATIONS, 2021, 500
  • [34] SYMMETRICAL PHASE-ONLY MATCHED FILTERING OF FOURIER-MELLIN TRANSFORMS FOR IMAGE REGISTRATION AND RECOGNITION
    CHEN, QS
    DEFRISE, M
    DECONINCK, F
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1994, 16 (12) : 1156 - 1168
  • [35] Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code
    Wang, Jiandong
    Song, Li
    Liang, Xianhong
    Liu, Yidong
    Liu, Pusheng
    OPTICAL AND QUANTUM ELECTRONICS, 2016, 48 (11)
  • [36] Binary image encryption based on interference of two phase-only masks
    Jia, Wei
    Wen, Fung Jacky
    Chow, Yuk Tak
    Zhou, Changhe
    APPLIED OPTICS, 2012, 51 (21) : 5253 - 5258
  • [37] Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code
    Jiandong Wang
    Li Song
    Xianhong Liang
    Yidong Liu
    Pusheng Liu
    Optical and Quantum Electronics, 2016, 48
  • [38] PHASE-ONLY FOURIER-TRANSFORM OF AN OPTICAL TRANSPARENCY
    JUTAMULIA, S
    APPLIED OPTICS, 1994, 33 (02): : 280 - 282
  • [39] Generation of Phase-Only Fourier Hologram Based on Double Phase Method and Quantization Error Analysis
    Wu, Yang
    Wang, Jun
    Chen, Chun
    Liu, Chan-Juan
    Jin, Feng-Ming
    Hu, Yu-Hen
    IEEE PHOTONICS JOURNAL, 2020, 12 (05):
  • [40] Phase-only information based heterocorrelation
    Khoury, J
    Gianino, PD
    Woods, CL
    OPTICAL PATTERN RECOGNITION XIV, 2003, 5106 : 233 - 240