Abstract

We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg–Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext–ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

© 2010 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  2. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
    [CrossRef]
  3. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, Opt. Express 15, 10253 (2007).
    [CrossRef] [PubMed]
  4. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
    [CrossRef] [PubMed]
  5. X. Peng, P. Zhang, H. Wei, and B. Yu, Opt. Lett. 31, 1044 (2006).
    [CrossRef] [PubMed]
  6. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
    [CrossRef]
  7. W. Liu, G. Yang, and H. Xie, Opt. Express 17, 13928 (2009).
    [CrossRef] [PubMed]
  8. M. Nieto-Vesperinas, R. Navarro, and F. J. Fuentes, J. Opt. Soc. Am. A 5, 30 (1988).
    [CrossRef]
  9. R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

2009 (1)

2008 (1)

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

2007 (1)

2006 (1)

2005 (1)

1998 (1)

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

1995 (1)

1988 (1)

1972 (1)

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Amaya, D.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Arcos, S.

Bellare, M.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Bolognini, N.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Carnicer, A.

Castro, A.

Desai, A.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Frauel, Y.

Fuentes, F. J.

Gerchberg, R. W.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Javidi, B.

Juvells, I.

Liu, W.

Montes-Usategui, M.

Naughton, T. J.

Navarro, R.

Nieto-Vesperinas, M.

Peng, X.

Pointcheval, D.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Refregier, P.

Rogaway, P.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Saxton, W. O.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Tebaldi, M.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Torroba, R.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Wei, H.

Xie, H.

Yang, G.

Yu, B.

Zhang, P.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1

Block diagram for the proposed procedure.

Fig. 2
Fig. 2

(a) Text object, (b) decryption using the original key, and recovered text object using (c) only the hybrid heuristic algorithm and (d) the combined algorithms.

Fig. 3
Fig. 3

(a) Input object, (b) recovered with the original key, and (c) recovered using the key provided by the combined algorithms attack on the plaintext of Fig. 2a.

Fig. 4
Fig. 4

(a) Input object and (b) recovered input object using the key obtained with the combined algorithms.

Fig. 5
Fig. 5

(a) Input object, recovered input object using the key (b) obtained using the hybrid heuristic algorithm and (c) obtained with the combined algorithms.

Equations (2)

Equations on this page are rendered with MathJax. Learn more.

I g ( u , v ) = | G ( u , v ) A ( u , v ) | 2 + | H ( u , v ) | 2 + [ G ( u , v ) A ( u , v ) ] H * ( u , v ) × exp ( i 4 π u a ) + [ G ( u , v ) A ( u , v ) ] * H ( u , v ) exp ( i 4 π u a ) ,
| U ( x , y ) | = [ g ( x , y ) ] δ ( x + a , y ) + rect ( x b , y b ) δ ( x a , y ) ,

Metrics