Article

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys

Universitat de Barcelona, Departament de FĂ­sica Aplicada i Optica, Diagonal 647, 08028 Barcelona, Spain.
Optics Letters (Impact Factor: 3.18). 08/2005; 30(13):1644-6. DOI: 10.1364/OL.30.001644
Source: PubMed

ABSTRACT We show how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type. The decryption key can be easily obtained by an opponent who has repeated access to either the encryption or decryption machines. However, we have also devised a solution that prevents the attack. Our results cast doubts on the present security of these techniques.

0 Followers
 · 
154 Views
  • Source
    • "Notice that Fourier transform, Fresnel transform and fractional Fourier transform are all special cases of linear canonical transform (LCT) [7] [8], the concept of LCTbased random phase encoding (LCT-RPE) is used to describe the DRPEs based on them. Cryptanalysis on these exploited LCT-RPE systems has been performed and reported, and it has been well known that known-plaintext attack (KPA) [9] [10], chosen-plaintext attack (CPA) [11] [12] [13] and chosen-ciphertext attack (CCA) [14] pose the greatest security threat. To our knowledge, most of the above reported attack schemes are motivating to reproduce the keys of the optical security systems, and each of them can only deal with one specific security system. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a chosen-plaintext attack scheme on general optical cryptosystems that use linear canonical transform and phase encoding based on correlated imaging. The plaintexts are chosen as Gaussian random real number matrixes, and the corresponding ciphertexts are regarded as prior knowledge of the proposed attack method. To establish the reconstruct of the secret plaintext, correlated imaging is employed using the known resources. Differing from the reported attack methods, there is no need to decipher the distribution of the decryption key. The original secret image can be directly recovered by the attack in the absence of decryption key. In addition, the improved cryptosystems combined with pixel scrambling operations are also vulnerable to the proposed attack method. Necessary mathematical derivations and numerical simulations are carried out to demonstrate the validity of the proposed attack scheme.
    Optics Communications 03/2015; 338. DOI:10.1016/j.optcom.2014.10.050 · 1.54 Impact Factor
  • Source
    • "Basically, the motivation of cryptanalysis attacks is to retrieve random phase codes [28] [29] [30] [31] [32] [33]. In our presented work, the random phase codes serve as the system locks and are independent of the ID cards. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method.
    Journal of optics 02/2015; 17(2). DOI:10.1088/2040-8978/17/2/025703 · 2.01 Impact Factor
  • Source
    • "The double random phase encoding (DRPE) technique proposed by Refregier and Javidi [1] is a noteworthy example. However, the DRPE technique and its derivatives [2] [3] [4] have been found to be vulnerable to some attacks [5] [6] [7] [8] [9]. Several approaches [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] have been reported in the literature to overcome the vulnerability of the DRPE scheme. "
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose an optical image security scheme based on polarized light encoding and the photon counting technique. An input image is encoded using the concept of polarized light, which is parameterized using Stokes–Mueller formalism. The encoded image is further encrypted by applying the photon counting imaging technique to obtain a photon limited image. For decryption, the photon limited decrypted image is obtained by using a polarized light decoding scheme with the help of appropriate keys. The decrypted image has sparse representation, which contains sufficient information for verification. This photon counted decrypted image can be verified using correlation filters. The proposed encryption technique offers benefits over the double random phase encoding in that it does not require active elements such as a lens and provides flexibility in the design of encryption keys. The proposed encryption scheme has also been used for hologram watermarking. The computer simulation results for secure image verification and the hologram watermarking scheme have been presented.
    Journal of optics 10/2014; 16(12):125406. DOI:10.1088/2040-8978/16/12/125406 · 2.01 Impact Factor