Skip to main content

Single Public Key Dependent Attack on Optical Asymmetric Cryptosystem

  • Conference paper
  • First Online:
Advances in Optical Science and Engineering

Part of the book series: Springer Proceedings in Physics ((SPPHY,volume 194))

  • 1129 Accesses

Abstract

This work aims to study the vulnerability of the phase-truncated Fourier transform (PTFT) based cryptosystem towards single key attack analysis. The existing attack algorithms aimed at retrieving the input information from the PTFT cryptosystems require the knowledge of both the encryption keys. In this work, we aim to retrieve the plaintext through phase retrieval algorithm that uses only one of the keys as its constraints. The proposed method is supported by simulation results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Refregier, P. and Javidi, B., “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).

    Google Scholar 

  2. Qin, W. and Peng, X., “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).

    Google Scholar 

  3. Wang, X. and Zhao D., “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).

    Google Scholar 

  4. Wang, X., Chen, Y., Dai, C., and Zhao, D., “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).

    Google Scholar 

  5. Kumar, P., Joseph, J., and Singh, K., “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).

    Google Scholar 

  6. Rajput, S. K. and Nishchal, N. K., “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).

    Google Scholar 

  7. Rajput, S. K. and Nishchal, N. K., “Known-plaintext attack on asymmetric cryptosystem,” Proc. SPIE 8855, 88550U (2013).

    Google Scholar 

  8. Rajput, S. K. and Nishchal, N. K., “An optical encryption and authentication scheme using asymmetric keys,” J. Opt. Soc. Am. A 31, 1233–1238 (2014).

    Google Scholar 

  9. Mehra, I. and Nishchal, N. K., “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474–5482 (2014).

    Google Scholar 

  10. Fatima, A., Mehra, I., and Nishchal, N. K., “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18 (2016) 085701.

    Google Scholar 

  11. Gerchberg, R. W., “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).

    Google Scholar 

  12. Fienup, J. R., “Phase retrieval algorithm: a comparison,” Appl. Opt. 21, 2758–2769 (1982).

    Google Scholar 

  13. Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part I: Optimization,” Appl. Opt. 54(15), 4698–4708 (2015).

    Google Scholar 

  14. Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems,” Appl. Opt. 54(15), 4709–4719 (2015).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Areeba Fatima .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Fatima, A., Nishchal, N.K. (2017). Single Public Key Dependent Attack on Optical Asymmetric Cryptosystem. In: Bhattacharya, I., Chakrabarti, S., Reehal, H., Lakshminarayanan, V. (eds) Advances in Optical Science and Engineering. Springer Proceedings in Physics, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-10-3908-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3908-9_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3907-2

  • Online ISBN: 978-981-10-3908-9

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics