Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys

被引:90
作者
Qin, W. [1 ]
Peng, X. [1 ]
机构
[1] Shenzhen Univ, Educ Minist China, Coll Optoelect Engn, Key Lab Optoelect Devices & Syst, Shenzhen 518060, Peoples R China
来源
JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS | 2009年 / 11卷 / 07期
基金
芬兰科学院; 中国国家自然科学基金; 中国博士后科学基金;
关键词
optical information security; known-plaintext attack; phase retrieval; fractional Fourier transform; FRESNEL DOMAIN; RETRIEVAL; IMAGE; SECURITY; INFORMATION; ALGORITHM; SYSTEMS; PLANE;
D O I
10.1088/1464-4258/11/7/075402
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
From the perspective of optical information security, we demonstrate that conventional phase retrieval algorithms, such as the Gerchberg-Saxton algorithm, can be still valid when extended from the Fourier transform domain into the fractional Fourier transform (FRFT) domain. Based on this extension, we propose a method of known-plaintext attack (KPA) on double random phase encoding in the fractional Fourier transform domain (DRPE-FRFT). With this attack, an opponent can access two encryption phase keys with the help of the phase retrieval algorithm in the FRFT domain, and meanwhile obtain the two FRFT order keys by using an exhaustive search. This indicates that the optical encryption scheme based on the DRPE-FRFT scheme is vulnerable to KPA due to the nature of the linearity of FRFT. The validity of this attack is verified by numerical simulations.
引用
收藏
页数:8
相关论文
共 20 条
[1]   Phase reconstruction from intensity measurements in linear systems [J].
Bastiaans, MJ ;
Wolf, KB .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2003, 20 (06) :1046-1049
[2]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[3]   A new method for phase retrieval in the optical system [J].
Cong, WX ;
Chen, NX ;
Gu, BY .
CHINESE PHYSICS LETTERS, 1998, 15 (01) :24-26
[4]   PHASE RETRIEVAL ALGORITHMS - A COMPARISON [J].
FIENUP, JR .
APPLIED OPTICS, 1982, 21 (15) :2758-2769
[5]  
GERCHBERG RW, 1972, OPTIK, V35, P237
[6]   Optical image encryption based on XOR operations [J].
Han, JW ;
Park, CS ;
Ryu, DH ;
Kim, ES .
OPTICAL ENGINEERING, 1999, 38 (01) :47-54
[7]   Securing information with optical technologies [J].
Javidi, B .
PHYSICS TODAY, 1997, 50 (03) :27-32
[8]   Security and encryption optical systems based on a correlator with significant output images [J].
Li, YZ ;
Kreske, K ;
Rosen, J .
APPLIED OPTICS, 2000, 39 (29) :5295-5301
[9]   Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain [J].
Meng, X. F. ;
Cai, L. Z. ;
Wang, Y. R. ;
Yang, X. L. ;
Xu, X. F. ;
Dong, G. Y. ;
Shen, X. X. ;
Zhang, H. ;
Cheng, X. C. .
JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2007, 9 (11) :1070-1075
[10]   Information security system by iterative multiple-phase retrieval and pixel random permutation [J].
Meng, Xiang-Feng ;
Cai, Lu-Zhong ;
Yang, Xiu-Lun ;
Shen, Xiao-Xia ;
Dong, Guo-Yan .
APPLIED OPTICS, 2006, 45 (14) :3289-3297