Article

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys

Universitat de Barcelona, Departament de FĂ­sica Aplicada i Optica, Diagonal 647, 08028 Barcelona, Spain.
Optics Letters (Impact Factor: 3.18). 08/2005; 30(13):1644-6. DOI: 10.1364/OL.30.001644
Source: PubMed

ABSTRACT We show how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type. The decryption key can be easily obtained by an opponent who has repeated access to either the encryption or decryption machines. However, we have also devised a solution that prevents the attack. Our results cast doubts on the present security of these techniques.

0 Followers
 · 
147 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we demonstrate three-dimensional (3D) object encryption using diffractive imaging and digital holography. For this purpose, a microlens array has been fabricated using the thermal reflow method, and then its digital hologram is recorded. The hologram of the microlens is encoded based on multiple intensity samplings of the complex-amplitude wave front with axial translation of the image sensor in the fractional Fourier transform domain. Then, the function is Fresnel propagated for three different positions of the camera, and the corresponding diffraction patterns are recorded as cipher-texts. For decryption, an iterative phase retrieval algorithm is applied to extract the hologram from corresponding encrypted images. The corresponding phase profile of the microlens array is then obtained. The simulation results demonstrate that the hologram is decrypted without any stagnation problem and with a rapid convergence rate. High security of the hologram has been achieved in the proposed digital holography-based diffractive imaging scheme. The correlation coefficient, a performance measurement parameter, has been calculated to check the effectiveness of the scheme. The proposed work has been validated through both experimental and simulation results.
    Journal of optics 03/2015; 17(3). DOI:10.1088/2040-8978/17/3/035707 · 2.01 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we specifically address the problem of securing distributed multimedia systems, based on networked tiny devices (i.e., Internet of Things). Such systems have usually to deal with three antagonistic constraints: (a) the hardware limitations of the devices in terms of computational power, memory storage and energy provision as they are driven by batteries, (b) the intrinsic voluminous and time sensitive nature of the captured multimedia data, and (c) their relative vulnerability to attacks since they are open platforms communicating through unreliable wireless radio communications. We propose and study a novel integrated approach, specifically tailored to significantly reduce the size of the transmitted multimedia data whilst ensuring its content confidentiality. In opposition to traditional approaches, based on cryptographic systems which inquire a huge overhead when applied to multimedia data, our approach makes use of Voronoi tesselation to transform the input data. This transformation, performed on a random fashion basis, allows both significant data reduction and content confidentiality as well, while it exhibits a very low complexity. We performed an in-depth security analysis of our proposal that reveals its robustness against all known types of attacks. Moreover, we conducted an extensive series of simulations, based on realistic settings, to show the effectiveness of our approach over state-of-the-art approaches, in the context of Wireless Multimedia Sensor Networks (WMSNs) applications.
    Ad Hoc Networks 02/2015; DOI:10.1016/j.adhoc.2015.01.007 · 1.94 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: We propose an image encryption system based on phase mask multiplexing and photon counting imaging (PCI) technique for multiple image authentications and digital hologram security. Multiple images to be authenticated are converted into phase-only images using a phase-retrieval algorithm in fractional Fourier transform domain. The multiple phase-only images are multiplexed into a single phase-only mask and it is further encrypted into a complex-valued function. The photon-limited image is generated by applying the PCI technique to a complex-valued function. For decryption, the photon-limited decrypted images are obtained after applying the appropriate keys. The photon-limited decrypted image contains sufficient information for verification because this image has sparse representation. To verify the photon-limited decrypted image, the optical correlation filters can be used. The proposed system has also been used for hologram security. For hologram security, the system provides multiple layers of security by hiding multiple encrypted images. The computer simulation results have been presented. The authentication scheme has been tested for securing three-dimensional information through experimentally recorded Fresnel digital hologram.
    Applied Optics 03/2015; 54(7). DOI:10.1364/AO.54.001657 · 1.69 Impact Factor