The keyed optical Hash function based on cascaded phase-truncated Fourier transforms

被引:24
作者
He, Wenqi [1 ]
Peng, Xiang [1 ]
Qin, Wan [1 ]
Meng, Xiangfeng [1 ]
机构
[1] Shenzhen Univ, Coll Optoelect Engn, Key Lab Optoelect Devices & Syst, Educ Minist China, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Fourier optics; Optical system design; Hybrid systems; Image processing; CRYPTOGRAPHY;
D O I
10.1016/j.optcom.2009.11.060
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An approach for constructing keyed optical Hash function (KOHF) is proposed, which is based on cascaded phase-truncated Fourier transforms (CPTFTs). The KOHF is created from a two-step one-way encryption process with a secret key imbedded. The non-linearity and one-way functionality is introduced by cascaded optical Fourier transforms with the phase-truncation operations, which could be implemented either digitally or optically. Once two 64-bit keyed Hash values are obtained in the two-step one-way encryption processes, respectively, they are then combined to form a final 128-bit keyed Hash value, which can also be regarded as a message authentication code (MAC). Moreover, the avalanche effect is also evaluated to show the performance of constructed KOHF with a set of numerical experiments. (C) 2009 Published by Elsevier B.V.
引用
收藏
页码:2328 / 2332
页数:5
相关论文
共 17 条
[1]  
BAKHTIARI S, 1996, LECT NOTES COMPUT SC, V1029, P1611
[2]  
Javidi B., 2005, Optical and Digital Techniques for Information Security
[3]   Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm [J].
Meng, X. F. ;
Peng, X. ;
Cai, L. Z. ;
Li, A. M. ;
Gao, Z. ;
Wang, Y. R. .
JOURNAL OF OPTICS A-PURE AND APPLIED OPTICS, 2009, 11 (08)
[4]  
Merkle R. C., 1990, Journal of Cryptology, V3, P43, DOI 10.1007/BF00203968
[5]  
National Institute of Standards and Technology (NIST), 1994, NIST FIPS PUB, V186
[6]   Information security system based on virtual-optics imaging methodology and public key infrastructure [J].
Peng, X ;
Zhang, P ;
Cai, LL .
OPTIK, 2004, 115 (09) :420-426
[7]   Asymmetric cryptography based on wavefront sensing [J].
Peng, Xiang ;
Wei, Hengzheng ;
Zhang, Peng .
OPTICS LETTERS, 2006, 31 (24) :3579-3581
[8]  
Preneel B, 1993, Analysis and design of cryptographic hash functions
[9]   OPTICAL-IMAGE ENCRYPTION BASED ON INPUT PLANE AND FOURIER PLANE RANDOM ENCODING [J].
REFREGIER, P ;
JAVIDI, B .
OPTICS LETTERS, 1995, 20 (07) :767-769
[10]  
Rivest R., 1992, 1321 RFC INT ACT BOA