Abstract

We demonstrate a method of chosen-plaintext attack on lensless double-random phase encoding (L-DRPE) in the Fresnel domain. With this attack an opponent can access two encryption keys with help of the impulse functions as chosen plaintexts. This shows that a lensless optical encryption scheme based on DRPE is vulnerable to chosen-plaintext attack. Cryptoanalysis also indicates that the security worry originates from the linearity of the encryption and decryption mechanism of the L-DRPE scheme. One of the interesting features of the proposed attack is that the decryption process is lossless. Numerical simulations show good agreement with theoretical analysis.

© 2006 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi, Phys. Today 50, 27 (1997).
    [CrossRef]
  2. P. Réfrégier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).
    [CrossRef] [PubMed]
  4. B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
    [CrossRef]
  5. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
    [CrossRef]
  6. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000).
    [CrossRef]
  7. S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003).
    [CrossRef] [PubMed]
  8. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
    [CrossRef] [PubMed]
  9. Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).
  10. X. Peng, P. Zhang, H. Wei, and B. Yu, Opt. Lett. 31, 1044 (2006).
    [CrossRef] [PubMed]
  11. U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. Sheridan, Opt. Express 14, 3181 (2006).
    [CrossRef] [PubMed]
  12. G. Situ and J. Zhang, Opt. Lett. 29, 1584 (2004).
    [CrossRef] [PubMed]
  13. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).

2006

2005

A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
[CrossRef] [PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).

2004

2003

2000

1999

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

1997

1995

Arcos, S.

Bernard, L.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Carnicer, A.

Castro, A.

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).

Frauel, Y.

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).

Glückstad, J.

Gopinathan, U.

Han, J. W.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Javidi, B.

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).

S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003).
[CrossRef] [PubMed]

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

B. Javidi, Phys. Today 50, 27 (1997).
[CrossRef]

B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).
[CrossRef] [PubMed]

P. Réfrégier and B. Javidi, Opt. Lett. 20, 767 (1995).
[CrossRef] [PubMed]

Juvells, I.

Kim, E. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Kishk, S.

Li, J.

Mogensen, P. C.

Monaghan, D. S.

Montes-Usategui, M.

Naughton, T. J.

U. Gopinathan, D. S. Monaghan, T. J. Naughton, and J. Sheridan, Opt. Express 14, 3181 (2006).
[CrossRef] [PubMed]

Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, in Proc. SPIE 5986, 25 (2005).

Park, C. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Peng, X.

Réfrégier, P.

Ryu, D. H.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Sheridan, J.

Situ, G.

Stallings, W.

W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice Hall, 1999).

Towghi, N.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Wei, H.

Yu, B.

Zhang, G.

Zhang, J.

Zhang, P.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (5)

Fig. 1
Fig. 1

Schematic diagram of L-DRPE.

Fig. 2
Fig. 2

(a) Random mask in (a) signal and (b) Fresnel domains.

Fig. 3
Fig. 3

(a) Plaintext, (b) cipher text, (c) decrypted result.

Fig. 4
Fig. 4

Decrypted results with windowed key(s) as described in the text.

Fig. 5
Fig. 5

Value of NMSE versus window size of key mask.

Equations (13)

Equations on this page are rendered with MathJax. Learn more.

u D i ( x , y ) = q i ( x , y ) FT { u ( x , y ) q i ( x , y ) } x = x λ D i , y = y λ D i ,
i = 1 , 2 ,
ψ ( x , y ) = q 2 ( x , y ) FT { FT [ f ( x , y ) R 1 ( x , y ) q 1 ( x , y ) ] R 2 ( x , y ) q 1 ( x , y ) q 2 ( x , y ) } .
K 1 ( x , y ) = FT [ f ( x , y ) A ( x , y ) ] B ( x , y ) .
K 11 ( x , y ) = FT [ f 1 ( x , y ) A ( x , y ) ] B ( x , y ) = FT [ δ ( x , y ) A ( x , y ) ] B ( x , y ) = FT [ δ ( x , y ) A ( 0 , 0 ) ] B ( x , y ) = FT [ δ ( x , y ) ] A ( 0 , 0 ) B ( x , y ) = A ( 0 , 0 ) B ( x , y ) .
K 12 ( x , y ) = A ( x , y ) B ( x , y ) .
K 12 ( x , y ) K 11 ( x , y ) = 1 A ( 0 , 0 ) A ( x , y ) I ,
A ̃ ( x , y ) = 1 A ( 0 , 0 ) A ( x , y ) ,
K 2 ( x , y ) = FT [ f 2 ( x , y ) A ( x , y ) ] B ( x , y ) .
B ̃ ( x , y ) = K 2 ( x , y ) FT [ f 2 ( x , y ) A ̃ ( x , y ) ] .
B ̃ ( x , y ) = B ( x , y ) A ( 0 , 0 ) .
f ̃ i ( x , y ) = FT 1 [ K i ( x , y ) B ̃ ( x , y ) * ] A ̃ ( x , y ) * .
f ̃ i ( x , y ) = f i ( x , y ) .

Metrics