Key-space analysis of double random phase encryption technique

被引:77
作者
Monaghan, David S.
Gopinathan, Unnikrishnan
Naughton, Thomas J.
Sheridan, John T. [1 ]
机构
[1] Univ Coll Dublin, Sch Elect Elect & Mech Engn, Coll Engn Math & Phys Sci, Dublin 4, Ireland
[2] Natl Univ Ireland, Dept Comp Sci, Maynooth, Kildare, Ireland
[3] Univ Oulu, RFMedia Lab, Oulu So Inst, FIN-84100 Ylivieska, Finland
关键词
OPTICAL-IMAGE ENCRYPTION; FRACTIONAL FOURIER; DIGITAL HOLOGRAPHY; ALGORITHMS; RETRIEVAL; ATTACKS; PLANE;
D O I
10.1364/AO.46.006641
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can Lie used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack. (c) 2007 Optical Society of America.
引用
收藏
页码:6641 / 6647
页数:7
相关论文
共 24 条
[1]   Optical encryption of digital data [J].
Brackenbury, LEM ;
Bell, KM .
APPLIED OPTICS, 2000, 39 (29) :5374-5379
[2]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[3]  
DEAVOURS CA, 1987, CRYPTOLOGY YESTERDAY
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   PHASE RETRIEVAL ALGORITHMS - A COMPARISON [J].
FIENUP, JR .
APPLIED OPTICS, 1982, 21 (15) :2758-2769
[6]   Resistance of the double random phase encryption against various attacks [J].
Frauel, Yann ;
Castro, Albertina ;
Naughton, Thomas J. ;
Javidi, Bahram .
OPTICS EXPRESS, 2007, 15 (16) :10253-10265
[7]  
GAINES GF, 1939, CRYPTANALYSIS STUDY
[8]   DIGITAL IMAGE FORMATION FROM ELECTRONICALLY DETECTED HOLOGRAMS [J].
GOODMAN, JW ;
LAWRENCE, RW .
APPLIED PHYSICS LETTERS, 1967, 11 (03) :77-+
[9]   A known-plaintext heuristic attack on the Fourier plane encryption algorithm [J].
Gopinathan, U ;
Monaghan, DS ;
Naughton, TJ ;
Sheridan, JT .
OPTICS EXPRESS, 2006, 14 (08) :3181-3186
[10]   Polarization encoding and multiplexing of two-dimensional signals: application to image encryption [J].
Gopinathan, Unnikrishnan ;
Naughton, Thomas J. ;
Sheridan, John T. .
APPLIED OPTICS, 2006, 45 (22) :5693-5700