OSA's Digital Library

Optics Letters

Optics Letters

| RAPID, SHORT PUBLICATIONS ON THE LATEST IN OPTICAL DISCOVERIES

  • Editor: Anthony J. Campillo
  • Vol. 31, Iss. 8 — Apr. 15, 2006
  • pp: 1044–1046

Known-plaintext attack on optical encryption based on double random phase keys

Xiang Peng, Peng Zhang, Hengzheng Wei, and Bin Yu  »View Author Affiliations


Optics Letters, Vol. 31, Issue 8, pp. 1044-1046 (2006)
http://dx.doi.org/10.1364/OL.31.001044


View Full Text Article

Enhanced HTML    Acrobat PDF (190 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We demonstrate a new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys. With this attack an opponent can access both random phase keys with the help of the phase retrieval technique. This demonstration shows that an optical encryption scheme based on double random encoding is vulnerable to known-plaintext attack.

© 2006 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(070.4560) Fourier optics and signal processing : Data processing by optical means
(100.0100) Image processing : Image processing
(200.0200) Optics in computing : Optics in computing

ToC Category:
Optical Encryption

History
Original Manuscript: October 25, 2005
Revised Manuscript: January 5, 2006
Manuscript Accepted: January 5, 2006

Citation
Xiang Peng, Peng Zhang, Hengzheng Wei, and Bin Yu, "Known-plaintext attack on optical encryption based on double random phase keys," Opt. Lett. 31, 1044-1046 (2006)
http://www.opticsinfobase.org/ol/abstract.cfm?URI=ol-31-8-1044


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. B. Javidi, Phys. Today 50(3), 27 (1997). [CrossRef]
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995). [CrossRef] [PubMed]
  3. B. Javidi, G. Zhang, and J. Li, Appl. Opt. 36, 1054 (1997). [CrossRef] [PubMed]
  4. B. Javidi, L. Bernard, and N. Towghi, Opt. Eng. 38, 9 (1999). [CrossRef]
  5. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999). [CrossRef]
  6. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000). [CrossRef]
  7. S. Kishk and B. Javidi, Opt. Lett. 28, 167 (2003). [CrossRef] [PubMed]
  8. A. Carnicer, M. Montes-Usategui, S. Arcos, and I. Juvells, Opt. Lett. 30, 1644 (2005). [CrossRef] [PubMed]
  9. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd ed. (Prentice-Hall, 1999).
  10. R. W. Gerchberg and W. O. Saxton, Optik (Stuttgart) 35, 237 (1972).
  11. J. R. Fienup, Appl. Opt. 21, 2758 (1982). [CrossRef] [PubMed]
  12. B. Javidi, 'Method and apparatus for encryption,' U.S. patent 6,002,773 (December 14, 1999).
  13. H. H. Bauschke, P. L. Combettes, and D. R. Luke, J. Opt. Soc. Am. A 19, 1334 (2002). [CrossRef]
  14. H. H. Bauschke, P. L. Combettes, and D. R. Luke, J. Opt. Soc. Am. A 20, 1025 (2003). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

Figures

Fig. 1 Fig. 2 Fig. 3
 

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited