Abstract

We demonstrate a new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys. With this attack an opponent can access both random phase keys with the help of the phase retrieval technique. This demonstration shows that an optical encryption scheme based on double random encoding is vulnerable to known-plaintext attack.

© 2006 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. B. Javidi, Phys. Today 50(3), 27 (1997).
    [CrossRef]
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
    [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).
    [CrossRef] [PubMed]
  4. B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
    [CrossRef]
  5. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
    [CrossRef]
  6. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000).
    [CrossRef]
  7. S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003).
    [CrossRef] [PubMed]
  8. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005).
    [CrossRef] [PubMed]
  9. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice-Hall, 1999).
  10. R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).
  11. J. R. Fienup, Appl. Opt. 21, 2758 (1982).
    [CrossRef] [PubMed]
  12. B. Javidi, 'Method and apparatus for encryption,' U.S. patent 6,002,773 (December 14, 1999).
  13. H. H. Bauschke, P. L. Combettes, and D. R. Luke, J. Opt. Soc. Am. A 19, 1334 (2002).
    [CrossRef]
  14. H. H. Bauschke, P. L. Combettes, and D. R. Luke, J. Opt. Soc. Am. A 20, 1025 (2003).
    [CrossRef]

2005

2003

2002

2000

1999

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

1997

1995

1982

1972

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Arcos, S.

Bauschke, H. H.

Bernard, L.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Carnicer, A.

Combettes, P. L.

Fienup, J. R.

Gerchberg, R. W.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Glückstad, J.

Han, J. W.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Javidi, B.

S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003).
[CrossRef] [PubMed]

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

B. Javidi, Phys. Today 50(3), 27 (1997).
[CrossRef]

B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997).
[CrossRef] [PubMed]

P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
[CrossRef] [PubMed]

B. Javidi, 'Method and apparatus for encryption,' U.S. patent 6,002,773 (December 14, 1999).

Juvells, I.

Kim, E. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Kishk, S.

Li, J.

Luke, D. R.

Mogensen, P. C.

Montes-Usategui, M.

Park, C. S.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Refregier, P.

Ryu, D. H.

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Saxton, W. O.

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Stallings, W.

W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice-Hall, 1999).

Towghi, N.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

Zhang, G.

Appl. Opt.

J. Opt. Soc. Am. A

Opt. Eng.

B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999).
[CrossRef]

J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
[CrossRef]

Opt. Lett.

Optik (Stuttgart)

R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).

Phys. Today

B. Javidi, Phys. Today 50(3), 27 (1997).
[CrossRef]

Other

W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice-Hall, 1999).

B. Javidi, 'Method and apparatus for encryption,' U.S. patent 6,002,773 (December 14, 1999).

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (3)

Fig. 1
Fig. 1

(a) Gray-scale Lena image. (b) Known ciphertext or encrypted image corresponding to (a). (c) Retrieved result with KPA.

Fig. 2
Fig. 2

(a) Binary image. (b) Known ciphertext or encrypted image corresponding to (a). (c) Retrieved result with KPA.

Fig. 3
Fig. 3

SSEs of phase-key retrieval versus the number of iterations for the gray-scale and the binary images.

Equations (9)

Equations on this page are rendered with MathJax. Learn more.

ψ ( α , β ) = F T { f ( x , y ) exp [ j n ( x , y ) ] } exp [ j b ( α , β ) ] .
ψ i ( x , y ) = { f i ( x , y ) exp [ j n ( x , y ) ] } * μ ( x , y )
ψ ( α , β ) = F T { f ( x , y ) exp [ j n ( x , y ) ] } exp [ j b ( α , β ) ] .
ψ i ( α , β ) = F T { G i ( x , y ) } exp [ j b ( α , β ) ] = G i ( α , β ) exp [ j b ( α , β ) ] .
ψ i ( α , β ) = G i ( α , β ) .
G i ( x , y ) = f i ( x , y ) exp [ j n ( x , y ) ] = f i ( x , y ) .
G i ( x , y ) = G i ( x , y ) exp [ j n ( x , y ) ]
S S E = 10 log [ ρ ρ ( n ) ] 2 ρ 2 ,
k 2 r = exp [ j b r ( α , β ) ] = F T { f i ( x , y ) k 1 r } ψ i ( α , β ) .

Metrics