Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2019-01-01
|
| Series: | IEEE Photonics Journal |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/8807146/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849422951175159808 |
|---|---|
| author | Yi Xiong Ravi Kumar Chenggen Quan |
| author_facet | Yi Xiong Ravi Kumar Chenggen Quan |
| author_sort | Yi Xiong |
| collection | DOAJ |
| description | In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes. |
| format | Article |
| id | doaj-art-16a8a6dd809f4b4daa932a2ed4ac6644 |
| institution | Kabale University |
| issn | 1943-0655 |
| language | English |
| publishDate | 2019-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Photonics Journal |
| spelling | doaj-art-16a8a6dd809f4b4daa932a2ed4ac66442025-08-20T03:30:51ZengIEEEIEEE Photonics Journal1943-06552019-01-0111511410.1109/JPHOT.2019.29362368807146Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval AlgorithmYi Xiong0Ravi Kumar1Chenggen Quan2https://orcid.org/0000-0002-4352-7545Department of Mechanical Engineering, National University of Singapore, SingaporeDepartment of Mechanical Engineering, National University of Singapore, SingaporeDepartment of Mechanical Engineering, National University of Singapore, SingaporeIn this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the phase key generated in G-S algorithm to form the first private key, which improves the complexity of the first private key. In addition, since the second private key is generated using the G-S algorithm, the number of known constraints decreases compared to the traditional PTFT-based cryptosystem, which will lead the non-convergence of special attacks. However, it has been found that two private keys generated in the cryptosystem based on PTFT and G-S algorithm are related to one phase key generated in the G-S algorithm, which provides an additional constraint to retrieve the other private key when one private key is disclosed. Based on this analysis, two iterative processes with different constraints are proposed to crack the cryptosystem based on PTFT and G-S algorithm. This is the first time to report the silhouette problem existing in the cryptosystem based on PTFT and G-S algorithm. Numerical simulations are carried out to validate the feasibility and effectiveness of our analysis and proposed iterative processes.https://ieeexplore.ieee.org/document/8807146/Optical image encryption and authenticationsecurity analysissilhouette problem |
| spellingShingle | Yi Xiong Ravi Kumar Chenggen Quan Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm IEEE Photonics Journal Optical image encryption and authentication security analysis silhouette problem |
| title | Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
| title_full | Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
| title_fullStr | Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
| title_full_unstemmed | Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
| title_short | Security Analysis on an Optical Encryption and Authentication Scheme Based on Phase-Truncation and Phase-Retrieval Algorithm |
| title_sort | security analysis on an optical encryption and authentication scheme based on phase truncation and phase retrieval algorithm |
| topic | Optical image encryption and authentication security analysis silhouette problem |
| url | https://ieeexplore.ieee.org/document/8807146/ |
| work_keys_str_mv | AT yixiong securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm AT ravikumar securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm AT chenggenquan securityanalysisonanopticalencryptionandauthenticationschemebasedonphasetruncationandphaseretrievalalgorithm |