Abstract

We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg–Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext–ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

© 2010 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Nonlinear optical security system based on a joint transform correlator in the Fresnel domain

Juan M. Vilardy, María S. Millán, and Elisabet Pérez-Cabré
Appl. Opt. 53(8) 1674-1682 (2014)

Known-plaintext attack on optical encryption based on double random phase keys

Xiang Peng, Peng Zhang, Hengzheng Wei, and Bin Yu
Opt. Lett. 31(8) 1044-1046 (2006)

Master key generation to avoid the use of an external reference wave in an experimental JTC encrypting architecture

Edgar Rueda, Carlos Ríos, John Fredy Barrera, and Roberto Torroba
Appl. Opt. 51(11) 1822-1827 (2012)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (2)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription