Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Key-space analysis of double random phase encryption technique

Not Accessible

Your library or personal account may give you access

Abstract

We perform a numerical analysis on the double random phase encryption∕decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

© 2007 Optical Society of America

Full Article  |  PDF Article
More Like This
Key-length analysis of double random phase encoding

Kazuya Nakano, Masafumi Takeda, and Hiroyuki Suzuki
Appl. Opt. 56(15) 4474-4479 (2017)

Role of phase key in the double random phase encoding technique: an error analysis

David S. Monaghan, Guohai Situ, Unnikrishnan Gopinathan, Thomas J. Naughton, and John T. Sheridan
Appl. Opt. 47(21) 3808-3816 (2008)

Evaluations of phase-only double random phase encoding based on key-space analysis

Kazuya Nakano, Masafumi Takeda, Hiroyuki Suzuki, and Masahiro Yamaguchi
Appl. Opt. 52(6) 1276-1283 (2013)

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (11)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (1)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.