Abstract
This work aims to study the vulnerability of the phase-truncated Fourier transform (PTFT) based cryptosystem towards single key attack analysis. The existing attack algorithms aimed at retrieving the input information from the PTFT cryptosystems require the knowledge of both the encryption keys. In this work, we aim to retrieve the plaintext through phase retrieval algorithm that uses only one of the keys as its constraints. The proposed method is supported by simulation results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Refregier, P. and Javidi, B., “Optical image encryption based on input plane encoding and Fourier plane random encoding,” Opt. Lett. 20, 767–769 (1995).
Qin, W. and Peng, X., “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett. 35, 118–120 (2010).
Wang, X. and Zhao D., “A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Commun. 285, 1078–1081 (2012).
Wang, X., Chen, Y., Dai, C., and Zhao, D., “Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform,” Appl. Opt. 53, 208–213 (2014).
Kumar, P., Joseph, J., and Singh, K., “Vulnerability of the security enhanced double random phase-amplitude encryption scheme to point spread function attack,” Opt. Lasers Eng. 50, 1196–1201 (2012).
Rajput, S. K. and Nishchal, N. K., “Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask,” Appl. Opt. 51, 5377–5386 (2012).
Rajput, S. K. and Nishchal, N. K., “Known-plaintext attack on asymmetric cryptosystem,” Proc. SPIE 8855, 88550U (2013).
Rajput, S. K. and Nishchal, N. K., “An optical encryption and authentication scheme using asymmetric keys,” J. Opt. Soc. Am. A 31, 1233–1238 (2014).
Mehra, I. and Nishchal, N. K., “Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding,” Opt. Express 22, 5474–5482 (2014).
Fatima, A., Mehra, I., and Nishchal, N. K., “Optical asymmetric cryptosystem using equal modulus decomposition and multiple diffractive imaging,” J. Opt. 18 (2016) 085701.
Gerchberg, R. W., “A practical algorithm for the determination of phase from image and diffraction plane pictures,” Optik 35, 237–246 (1972).
Fienup, J. R., “Phase retrieval algorithm: a comparison,” Appl. Opt. 21, 2758–2769 (1982).
Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part I: Optimization,” Appl. Opt. 54(15), 4698–4708 (2015).
Guo, C., Liu, S., and Sheridan, J. T., “Iterative phase retrieval algorithms. Part II: Attacking optical encryption systems,” Appl. Opt. 54(15), 4709–4719 (2015).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Fatima, A., Nishchal, N.K. (2017). Single Public Key Dependent Attack on Optical Asymmetric Cryptosystem. In: Bhattacharya, I., Chakrabarti, S., Reehal, H., Lakshminarayanan, V. (eds) Advances in Optical Science and Engineering. Springer Proceedings in Physics, vol 194. Springer, Singapore. https://doi.org/10.1007/978-981-10-3908-9_38
Download citation
DOI: https://doi.org/10.1007/978-981-10-3908-9_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3907-2
Online ISBN: 978-981-10-3908-9
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)