Abstract

We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

© 2010 Optical Society of America

PDF Article

References

  • View by:
  • |
  • |
  • |

  1. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef]
  2. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
    [CrossRef]
  3. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, Opt. Express 15, 10253 (2007).
    [CrossRef]
  4. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
    [CrossRef]
  5. X. Peng, P. Zhang, H. Wei, and B. Yu, Opt. Lett. 31, 1044 (2006).
    [CrossRef]
  6. D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
    [CrossRef]
  7. W. Liu, G. Yang, and H. Xie, Opt. Express 17, 13928 (2009).
    [CrossRef]
  8. M. Nieto-Vesperinas, R. Navarro, and F. J. Fuentes, J. Opt. Soc. Am. A 5, 30 (1988).
    [CrossRef]
  9. R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

2009 (1)

2008 (1)

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

2007 (1)

2006 (1)

2005 (1)

1998 (1)

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

1995 (1)

1988 (1)

1972 (1)

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Amaya, D.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Arcos, S.

Bellare, M.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Bolognini, N.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Carnicer, A.

Castro, A.

Desai, A.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Frauel, Y.

Fuentes, F. J.

Gerchberg, R. W.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Javidi, B.

Juvells, I.

Liu, W.

Montes-Usategui, M.

Naughton, T. J.

Navarro, R.

Nieto-Vesperinas, M.

Peng, X.

Pointcheval, D.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Refregier, P.

Rogaway, P.

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Saxton, W. O.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Tebaldi, M.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Torroba, R.

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

Wei, H.

Xie, H.

Yang, G.

Yu, B.

Zhang, P.

J. Opt. A (1)

D. Amaya, M. Tebaldi, R. Torroba, and N. Bolognini, J. Opt. A 10, 104031 (2008).
[CrossRef]

J. Opt. Soc. Am. A (1)

Lect. Notes Comput. Sci. (1)

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
[CrossRef]

Opt. Express (2)

Opt. Lett. (3)

Optik (Stuttgart) (1)

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Metrics