Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm

In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the...

Full description

Saved in:
Bibliographic Details
Main Authors: Yi Xiong, Ravi Kumar, Chenggen Quan
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8807146/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849422951175159808
author Yi Xiong
Ravi Kumar
Chenggen Quan
author_facet Yi Xiong
Ravi Kumar
Chenggen Quan
author_sort Yi Xiong
collection DOAJ
description In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes.
format Article
id doaj-art-16a8a6dd809f4b4daa932a2ed4ac6644
institution Kabale University
issn 1943-0655
language English
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Photonics Journal
spelling doaj-art-16a8a6dd809f4b4daa932a2ed4ac66442025-08-20T03:30:51ZengIEEEIEEE Photonics Journal1943-06552019-01-0111511410.1109/JPHOT.2019.29362368807146Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval AlgorithmYi Xiong0Ravi Kumar1Chenggen Quan2https://orcid.org/0000-0002-4352-7545Department of Mechanical Engineering, National University of Singapore, SingaporeDepartment of Mechanical Engineering, National University of Singapore, SingaporeDepartment of Mechanical Engineering, National University of Singapore, SingaporeIn this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes.https://ieeexplore.ieee.org/document/8807146/Optical image encryption and authenticationsecurity analysissilhouette problem
spellingShingle Yi Xiong
Ravi Kumar
Chenggen Quan
Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
IEEE Photonics Journal
Optical image encryption and authentication
security analysis
silhouette problem
title Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
title_full Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
title_fullStr Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
title_full_unstemmed Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
title_short Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
title_sort security analysis on an optical encryption and authentication scheme based on phase truncation and phase retrieval algorithm
topic Optical image encryption and authentication
security analysis
silhouette problem
url https://ieeexplore.ieee.org/document/8807146/
work_keys_str_mv AT yixiong securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm
AT ravikumar securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm
AT chenggenquan securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm