OSA's Digital Library

Optics Letters

Optics Letters

| RAPID, SHORT PUBLICATIONS ON THE LATEST IN OPTICAL DISCOVERIES

  • Vol. 30, Iss. 13 — Jul. 1, 2005
  • pp: 1644–1646

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys

Arturo Carnicer, Mario Montes-Usategui, Sergio Arcos, and Ignacio Juvells  »View Author Affiliations


Optics Letters, Vol. 30, Issue 13, pp. 1644-1646 (2005)
http://dx.doi.org/10.1364/OL.30.001644


View Full Text Article

Acrobat PDF (350 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

We show how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type. The decryption key can be easily obtained by an opponent who has repeated access to either the encryption or decryption machines. However, we have also devised a solution that prevents the attack. Our results cast doubts on the present security of these techniques.

© 2005 Optical Society of America

OCIS Codes
(070.0070) Fourier optics and signal processing : Fourier optics and signal processing
(100.0100) Image processing : Image processing

Citation
Arturo Carnicer, Mario Montes-Usategui, Sergio Arcos, and Ignacio Juvells, "Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys," Opt. Lett. 30, 1644-1646 (2005)
http://www.opticsinfobase.org/ol/abstract.cfm?URI=ol-30-13-1644


Sort:  Author  |  Year  |  Journal  |  Reset

References

  1. B. Javidi and J. L. Horner, Opt. Eng. 33, 1752 (1994).
  2. P. Refregier and B. Javidi, Opt. Lett. 20, 767 (1995).
  3. N. Towghi, B. Javidi, and Z. Luo, J. Opt. Soc. Am. A 16, 1915 (1999).
  4. J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, Opt. Eng. 38, 47 (1999).
  5. P. C. Mogensen and J. Glückstad, Opt. Lett. 25, 566 (2000).
  6. N. Cam-Winget, R. Housley, and D. Wagner, Commun. ACM 46, 35 (2003).
  7. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Lect. Notes Comput. Sci. 1462, 26 (1998).
  8. J. Katz and B. Schneier, presented at the Ninth Annual USENIX Security Symposium, Denver, Colo., August 14-17, 2000, available at http://www.schneier.com/paper-chotext.pdf.
  9. K. Jallad, J. Katz, and B. SchneierLect. Notes Comput. Sci. 2433, 90 (2002).
  10. O. Matoba and B. Javidi, Appl. Opt. 38, 6785 (1999).
  11. O. Matoba and B. Javidi, Opt. Lett. 24, 762 (1999).
  12. O. Matoba and B. Javidi, Appl. Opt. 38, 7288 (1999).
  13. B. Javidi, "Method and apparatus for encryption using partial information," U.S. patent 6,519,340 (February 11, 2003).
  14. B. Javidi, "Method and apparatus for encryption," U.S. patent 6,002,773 (December 14, 1999).
  15. B. Javidi, "Method and apparatus for encryption," U.S. patent 5,903,648 (May 11, 1999).
  16. B. Javidi and O. Matoba, "Method and apparatus for secure ultrafast communication," U.S. patent application 20020150242 (October 17, 2002).

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited