Known plain-text Attack on Asymmetric Cryptosystem

被引:2
作者
Rajput, Sudheesh K. [1 ]
Nishchal, Naveen K. [1 ]
机构
[1] Indian Inst Technol Patna, Dept Phys, Patna 800013, Bihar, India
来源
OPTICS AND PHOTONICS FOR INFORMATION PROCESSING VII | 2013年 / 8855卷
关键词
Image processing; Image encryption; Optical cryptography; Phase retrieval; Fractional Fourier transform; GERCHBERG-SAXTON ALGORITHM; OPTICAL-IMAGE ENCRYPTION; FRACTIONAL FOURIER; PHASE RETRIEVAL; VULNERABILITY;
D O I
10.1117/12.2023834
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
It is believed that asymmetric cryptosystem based on phase-truncated Fourier transform has immunity against known-plaintext attack. However, generation of two asymmetric keys is possible, if plaintext-ciphertext pair is known. In this paper, we show that amplitude- and phase-truncation-based asymmetric cryptosystem is vulnerable to known-plaintext attack. The decryption keys are generated with the help of modified Gerchberg-Saxton phase retrieval algorithm from known-plaintext and cipher-text. The first key is generated from known-plaintext and the second key is generated from the cipher-text. With the help of the generated keys, the encrypted image in one domain is decrypted successfully in another domain. The domains used for this study are Fourier, Fresnel, fractional Fourier or gyrator domain. The vulnerability is proved through the results of computer simulation.
引用
收藏
页数:6
相关论文
共 28 条
[1]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[2]   Optical color image encryption based on an asymmetric cryptosystem in the Fresnel domain [J].
Chen, Wen ;
Chen, Xudong .
OPTICS COMMUNICATIONS, 2011, 284 (16-17) :3913-3917
[3]   Security improvement for asymmetric cryptosystem based on spherical wave illumination [J].
Ding, Xiangling ;
Deng, Xiaopeng ;
Song, Kehui ;
Chen, Guangyi .
APPLIED OPTICS, 2013, 52 (03) :467-473
[4]   PHASE RETRIEVAL ALGORITHMS - A COMPARISON [J].
FIENUP, JR .
APPLIED OPTICS, 1982, 21 (15) :2758-2769
[5]   Optical image encryption by random shifting in fractional Fourier domains [J].
Hennelly, B ;
Sheridan, JT .
OPTICS LETTERS, 2003, 28 (04) :269-271
[6]   Fast double-phase retrieval in Fresnel domain using modified Gerchberg-Saxton algorithm for lensless optical security systems [J].
Hwang, Hone-Ene ;
Chang, Hsuan T. ;
Lie, Wen-Nung .
OPTICS EXPRESS, 2009, 17 (16) :13700-13710
[7]  
Javidi B., 2005, Optical and Digital Techniques for Information Security
[8]   Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack [J].
Kumar, Pramod ;
Kumar, Arvind ;
Joseph, Joby ;
Singh, Kehar .
OPTICS AND LASERS IN ENGINEERING, 2012, 50 (09) :1196-1201
[9]   Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm [J].
Liu, Wei ;
Liu, Zhengjun ;
Liu, Shutian .
OPTICS LETTERS, 2013, 38 (10) :1651-1653
[10]   Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification [J].
Mehra, Isha ;
Rajput, Sudheesh Kumar ;
Nishchal, Naveen Kumar .
OPTICAL ENGINEERING, 2013, 52 (02)