Advertisement

Single Public Key Dependent Attack on Optical Asymmetric Cryptosystem

  • Areeba FatimaEmail author
  • Naveen K. Nishchal
Conference paper
Part of the Springer Proceedings in Physics book series (SPPHY, volume 194)

Abstract

This work aims to study the vulnerability of the phase-truncated Fourier transform (PTFT) based cryptosystem towards single key attack analysis. The existing attack algorithms aimed at retrieving the input information from the PTFT cryptosystems require the knowledge of both the encryption keys. In this work, we aim to retrieve the plaintext through phase retrieval algorithm that uses only one of the keys as its constraints. The proposed method is supported by simulation results.

References

  1. 1.
    Refregier, P. and Javidi, B., “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).Google Scholar
  2. 2.
    Qin, W. and Peng, X., “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).Google Scholar
  3. 3.
    Wang, X. and Zhao D., “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).Google Scholar
  4. 4.
    Wang, X., Chen, Y., Dai, C., and Zhao, D., “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).Google Scholar
  5. 5.
    Kumar, P., Joseph, J., and Singh, K., “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).Google Scholar
  6. 6.
    Rajput, S. K. and Nishchal, N. K., “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).Google Scholar
  7. 7.
    Rajput, S. K. and Nishchal, N. K., “Known-plaintext attack on asymmetric cryptosystem,” Proc. SPIE 8855, 88550U (2013).Google Scholar
  8. 8.
    Rajput, S. K. and Nishchal, N. K., “An optical encryption and authentication scheme using asymmetric keys,” J. Opt. Soc. Am. A 31, 1233–1238 (2014).Google Scholar
  9. 9.
    Mehra, I. and Nishchal, N. K., “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474–5482 (2014).Google Scholar
  10. 10.
    Fatima, A., Mehra, I., and Nishchal, N. K., “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18 (2016) 085701.Google Scholar
  11. 11.
    Gerchberg, R. W., “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).Google Scholar
  12. 12.
    Fienup, J. R., “Phase retrieval algorithm: a comparison,” Appl. Opt. 21, 2758–2769 (1982).Google Scholar
  13. 13.
    Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part I: Optimization,” Appl. Opt. 54(15), 4698–4708 (2015).Google Scholar
  14. 14.
    Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems,” Appl. Opt. 54(15), 4709–4719 (2015).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2017

Authors and Affiliations

  1. 1.Department of PhysicsIndian Institute of Technology PatnaPatnaIndia

Personalised recommendations