期刊文献+

约束集投影算法和4f相关器的光学密码系统的已知明文攻击 被引量:2

Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator
原文传递
导出
摘要 分析了约束集投影和4f相关器的光学加密系统的安全性,并提出一种基于双强度相位恢复的已知明文攻击方法。约束集投影和4f相关器的加密系统是典型的光学密码系统,由于其解密系统可以等价于一个标准的4f系统,并且加密密钥与解密密钥相同,因此本质上仍是一个线性系统,这就为系统的安全性留下了很大隐患。该攻击方法仅利用一对输入的相位信息和相应输出的强度信息即可成功得到加密系统的密钥,提高了攻击实施的可行性。 The security of the cryptosystem based on projection-onto-constraint-sets (POCS) and a 4f correlator is examined. A method of known-plaintext attack based on phase retrieval algorithm from two-intensity information is presented. In the field of information security the cryptosystem based on POCS and the 4f correlator is a typical approach. But its decryption system can be equivalent to the standard 4f system and the encryption and decrypfion keys are identical. So this linearity characteristic opens avenues of attacks. With the known-plaintext attack method, an attacker is able to break down the cryptosystem by only a pair of input phase data and output intensity data.
作者 位恒政 彭翔
出处 《光学学报》 EI CAS CSCD 北大核心 2008年第3期429-434,共6页 Acta Optica Sinica
基金 国家自然科学基金(60472107) 广东省自然科学基金(04300862) 深圳市科技计划项目(200426) 中国科学院微系统与信息技术研究所资助课题
关键词 信息光学 光学信息安全 已知明文攻击 相位恢复 information optics optical-information security known-plaintext attack phase retrieval
  • 相关文献

参考文献18

二级参考文献73

  • 1彭翔,张鹏,牛憨笨.基于虚拟光学的三维空间数字水印系统[J].光学学报,2004,24(11):1507-1510. 被引量:17
  • 2胡建彰,李炜,陈江涛.JPEG──算法与实现[J].南京邮电学院学报,1994,14(3):43-50. 被引量:7
  • 3杨晓苹,翟宏琛.双随机相位加密中相息图的优化设计[J].物理学报,2005,54(4):1578-1582. 被引量:9
  • 4Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique[J]. Appl. Opt. , 2002, 41(5): 865-873
  • 5Wang Yingzong, Zhen Yankun, Zhang Hongjun et al.. Study ondigital holography with single phase-shifting operation[J]. Chin.Opt, Lett,, 2004, 2(3): 141-143
  • 6Enrique Tajahuerce, Osamu Matoba, Bahram Javidi. Shiftinvariant three dimensional object recognition by means of digital holography[J]. Appl. Opt., 2001, 411(23): 3877-3886
  • 7Hsu Chiouting, Wu Jaling. Hidden digital watermarks in images[J]. IEEE Trans. Image Proc. , 1999, 8(1): 58-68
  • 8Neto L G,Opt Eng,1996年,35卷,9期,2459页
  • 9Refregier P, Javidi B. Optical image encryption based on input and Fourier plane random encoding. Opt. Lett.,1995, 20(7):767-769.
  • 10Javidi B. Securing information by use of digital holography. Opt. Lett. , 2000, 25(1):28-30.

共引文献125

同被引文献26

  • 1彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:42
  • 2位恒政,彭翔,张鹏,刘海涛,封松林.双随机相位加密系统的选择明文攻击[J].光学学报,2007,27(5):824-829. 被引量:15
  • 3Refregier P,Javidi B.Optical image encryption based on input plane and Fourier plane random encoding[J].Opt Lett,1995,20(70):767-769.
  • 4G Unnikrishnan,J Joseph,K Singh.Optical encryption by double-random phase encoding in the fractional Fourier domain[J].Opt Lett,2000,25(12):887-889.
  • 5D Abookasis,O Arazi,J Rosen,et al..Security optical systems based on a joint transform correlator with significant output images[J].Opt Eng,2001,40(8):1584-1589.
  • 6T Nomura,B Javidi.Optical encryption using a joint transform correlator architecture[J].Opt Eng,2000,39(8):2031-2035.
  • 7B Javidi,T Nomura.Securing information by use of digital holography[J].Opt Lett,2000,25(l):28-30.
  • 8Zhu N,Wang Y T,Liu J,et al..Optical image encryption based on interference of polarized light[J].Opt Express,2009,17(16):13418-13424.
  • 9A Alfalou,C Brosseau.Dual encryption scheme of images using polarized light [J].Opt Lett,2010,35(13):2185-2187.
  • 10Chen L F,Zhao D M.Optical image encryption based on fractional wavelet transform[J].Opt Commun,2005,254(4-6):361-367.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部