Fractional Domain Asymmetric Cryptosystem and Cryptanalysis

被引:0
作者
Rajput, Sudheesh K. [1 ]
Nishchal, Naveen K. [1 ]
机构
[1] Indian Inst Technol Patna, Dept Phys, Patna 800013, Bihar, India
来源
INTERNATIONAL CONFERENCE ON OPTICS IN PRECISION ENGINEERING AND NANOTECHNOLOGY (ICOPEN2013) | 2013年 / 8769卷
关键词
Image encryption; Fractional Fourier transform; Phase retrieval; OPTICAL-IMAGE ENCRYPTION; RANDOM-PHASE ENCRYPTION; PLAINTEXT ATTACK; SECURITY ENHANCEMENT; SILHOUETTE REMOVAL; INTERFERENCE; TRANSFORM; TRUNCATION; DECRYPTION; RESISTANCE;
D O I
10.1117/12.2014375
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
Most of the reported optical techniques of encryption in literature belong to the category of symmetric cryptosystems, in which the keys used for encryption are identical to the decryption keys. In an environment of network security, a symmetric cryptosystem would suffer from problems in key distribution, management, and delivery. In this paper, we present the results of an asymmetric cryptosystem that uses fractional Fourier transform domain amplitude- and phase-truncation approach. The input image/data used are gray-scale and color patterns. The conventional random phase masks are replaced with structured phase masks to further enhance the key size and hence security of cryptosystem. The scheme also uses the concept of interference and polarization selective diffractive optical element. Cryptanalysis has been carried out considering various types of attacks using phase retrieval algorithm. Numerical simulation results have been presented.
引用
收藏
页数:10
相关论文
共 51 条
[1]  
Alam M., 2011, 2011 Proceedings of International Conference on Emerging Trends in Networks and Computer Communications (ETNCC 2011), P434, DOI 10.1109/ETNCC.2011.6255938
[2]   Optical encryption method using toroidal zone plates [J].
Barrera, JF ;
Henao, R ;
Torroba, R .
OPTICS COMMUNICATIONS, 2005, 248 (1-3) :35-40
[3]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[4]   Optical asymmetric cryptography using a three-dimensional space-based model [J].
Chen, Wen ;
Chen, Xudong .
JOURNAL OF OPTICS, 2011, 13 (07)
[5]   Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain [J].
Chen, Wen ;
Chen, Xudong .
OPTICS COMMUNICATIONS, 2011, 284 (16-17) :3913-3917
[6]   Security enhancement of double-random phase encryption by amplitude modulation [J].
Cheng, X. C. ;
Cai, L. Z. ;
Wang, Y. R. ;
Meng, X. F. ;
Zhang, H. ;
Xu, X. F. ;
Shen, X. X. ;
Dong, G. Y. .
OPTICS LETTERS, 2008, 33 (14) :1575-1577
[7]   Single-channel color image encryption based on asymmetric cryptosystem [J].
Deng, Xiaopeng ;
Zhao, Daomu .
OPTICS AND LASER TECHNOLOGY, 2012, 44 (01) :136-140
[8]   Security improvement for asymmetric cryptosystem based on spherical wave illumination [J].
Ding, Xiangling ;
Deng, Xiaopeng ;
Song, Kehui ;
Chen, Guangyi .
APPLIED OPTICS, 2013, 52 (03) :467-473
[9]   POLARIZATION-SELECTIVE COMPUTER-GENERATED HOLOGRAMS [J].
FORD, JE ;
XU, F ;
URQUHART, K ;
FAINMAN, Y .
OPTICS LETTERS, 1993, 18 (06) :456-458
[10]   Resistance of the double random phase encryption against various attacks [J].
Frauel, Yann ;
Castro, Albertina ;
Naughton, Thomas J. ;
Javidi, Bahram .
OPTICS EXPRESS, 2007, 15 (16) :10253-10265