期刊文献+

双随机相位加密系统的无约束最优化攻击 被引量:1

Unconstrained optimization attack on double random phase cryptosystem
下载PDF
导出
摘要 提出一种针对双随机光学相位加密系统的无约束最优化攻击算法.在已知明文条件下,首次将双随机相位加密系统的攻击问题转化为一个单目标无约束最优化模型.基于该模型,在相应的攻击算法设计中,采用拟牛顿矩阵代替Hessian矩阵以准确获取系统的密钥,避免传统牛顿法需要计算Hessian矩阵的逆等严重缺陷.同时,因有效利用拟牛顿矩阵的正定、对称、可迭代求逆的特点,新的攻击算法具有恢复效果好、收敛速度快、初值依赖弱、鲁棒性较强等优势.此外,本算法所需约束条件较少,可方便地移植到其他光学加密系统的攻击中. An unconstrained optimization method is proposed to attack the double phase encryption system. Under the condition of knowing the plaintext, the new attack method builds an unconstrained optimization model and gets the accurate phase key via this model. Using the acquired phase key, the attacker decrypts the followed cipher. The new attack method transforms the problem of attacking the double phase encryption system into an unconstrained optimization model. The new attack method replaces Hessian matrix by quasi-Newton matrix to avoid computation of the reverse of Hessian matrix. The new attack method has fast convergence speed and strong robustness, and it is not too sensitive to the original values of the variables. This attack method can be applied to other encryption systems.
出处 《中国科学院大学学报(中英文)》 CSCD 北大核心 2016年第5期604-611,共8页 Journal of University of Chinese Academy of Sciences
基金 国家自然科学基金(61575197) 中国科学院科学融合教育创新项目资助
关键词 光学信息安全 双随机相位加密系统 光学攻击 非约束最优化 optical information security double random phase cryptosystem optical attack unconstrained optimization
  • 相关文献

参考文献23

  • 1Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding [ J ]. Optics Letters, 1995, 20(7) : 767-769.
  • 2Arturo C, Mario M U, Sergio A, et al. Vulnerability to chosen-cyphcrtext attacks of optical encryption schemes based on double random phase keys[ J ]. Optics Letters, 2010, 30 (30) : 1 644-1 646.
  • 3Peng X, Wei H Z, Zhang P. Chosen-plaintext attack onlensless double-random phase encoding in the Fresnel domain [J]. Optics Letters, 2006, 31 (22): 3261-3263.
  • 4He W Q, Peng X, Meng X F. A hybrid strategy for cryptanalysis of optical encryption based on double-random phase-amplitude encoding C J ]. Optics & l,aser Technology, 2012, 44(5) : 1 203-1 206.
  • 5He W Q, Peng X, Meng X F, et al. Collision in optical image encryption based on interference and a method for avoiding lhis secority leak [ J ]. Optics & Laser Technology, 2013, 47(47) : 31-36.
  • 6Situ G H, Peolrini G, Osten W. Strategy for cryptanalysis of optical encryption in the Fresnel domain[ J]. Applied Optics, 2010, 49(3) : 457-462.
  • 7Peng X, Zhang P, Wet H Z, et al. Known-plaintext attack on optical encryption based on double random phase keys [ J ]. Optics Letters, 2006, 31 (8) : 1 044-1 046.
  • 8John Fredy B. Carlos V, Myrian T, et al. Known-plaintext attack on a joint transform correlator encrypting system [ J ]. Optics Letters, 2010, 35(21): 3 553-3 555.
  • 9Wang X G,Chen Y X,Dai C Q, et al. Discussion and a new attack of the optical asymmetric cu'ptosystem based on phase- truncated Fourier transform [ J]. Applied Optics, 2014, 53 (2) : 208-213.
  • 10Gopinathan U, Monaghan D S, Naughton T J, et al. A known-plaintext heuristic attack on the Fourier plane encryption algorithm [ J ]. Optics Express, 2006, 14 ( 8 ) : 3 181-3 186.

二级参考文献30

共引文献8

同被引文献8

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部