Abstract

The asymmetric cryptosystem, which is based on phase-truncated Fourier transforms (PTFTs), can break the linearity of conventional systems. However, it has been proven to be vulnerable to a specific attack based on iterative Fourier transforms when the two random phase masks are used as public keys to encrypt different plaintexts. An improvement from the asymmetric cryptosystem may be taken by relocating the amplitude values in the output plane. In this paper, two different methods are adopted to realize the amplitude modulation of the output image. The first one is to extend the PTFT-based asymmetrical cryptosystem into the anamorphic fractional Fourier transform domain directly, and the second is to add an amplitude mask in the Fourier plane of the encryption scheme. Some numerical simulations are presented to prove the good performance of the proposed cryptosystems.

© 2011 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Security improvement for asymmetric cryptosystem based on spherical wave illumination

Xiangling Ding, Xiaopeng Deng, Kehui Song, and Guangyi Chen
Appl. Opt. 52(3) 467-473 (2013)

Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

Xiaogang Wang, Yixiang Chen, Chaoqing Dai, and Daomu Zhao
Appl. Opt. 53(2) 208-213 (2014)

Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform

Yong Wang, Chenggen Quan, and Cho Jui Tay
Appl. Opt. 54(22) 6874-6881 (2015)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (9)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (17)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription