光学学报, 2008, 28 (3): 429, 网络出版: 2008-03-24   

约束集投影算法和4f相关器的光学密码系统的已知明文攻击

Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator
位恒政 1,2,*彭翔 1,2
作者单位
1 天津大学精密测试技术及仪器国家重点实验室, 天津 300072
2 深圳大学光电子学研究所光电子器件与系统教育部重点实验室, 广东 深圳 518060
摘要
分析了约束集投影和4f相关器的光学加密系统的安全性,并提出一种基于双强度相位恢复的已知明文攻击方法。约束集投影和4f相关器的加密系统是典型的光学密码系统,由于其解密系统可以等价于一个标准的4f系统,并且加密密钥与解密密钥相同,因此本质上仍是一个线性系统,这就为系统的安全性留下了很大隐患。该攻击方法仅利用一对输入的相位信息和相应输出的强度信息即可成功得到加密系统的密钥,提高了攻击实施的可行性。
Abstract
The security of the cryptosystem based on projection-onto-constraint-sets (POCS) and a 4f correlator is examined. A method of known-plaintext attack based on phase retrieval algorithm from two-intensity information is presented. In the field of information security the cryptosystem based on POCS and the 4f correlator is a typical approach. But its decryption system can be equivalent to the standard 4f system and the encryption and decryption keys are identical. So this linearity characteristic opens avenues of attacks. With the known-plaintext attack method, an attacker is able to break down the cryptosystem by only a pair of input phase data and output intensity data.
参考文献

[1] . Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett., 1995, 20(7): 767-769.

[2] . Double-lock for image encryption with virtual optical wavelength[J]. Opt. Exp., 2001, 10(1): 41-45.

[3] Xiang Peng, Zhiyong Cui, Tieniu Tan. Information encryption with virtual-optics imaging system[J]. Opt. Commun., 2002, 212(4~6): 235~245

[4] Peng Xiang, Zhang Peng, Niu Hanben. Information hiding theory based on virtual optics and its implementation with parallel hardware[J]. Acta Optica Sinica, 2004, 24(5): 623~627
彭翔,张鹏,牛憨笨. 虚拟光学信息隐藏理论及并行硬件实现[J]. 光学学报, 2004, 24(5): 623~627

[5] Peng Xiang, Zhang Peng, Niu Hanben. 3-D spatial digital watermarking system based on virtual optics[J]. Acta Optica Sinica, 2004, 24(11): 1507~1510
彭翔,张鹏,牛憨笨. 基于虚拟光学的三维空间数字水印系统[J]. 光学学报, 2004, 24(11): 1507~1510

[6] Yu Bin, Peng Xiang. Optical image encryption based on cascaded phase retrieval algorithm[J]. Acta Optica Sinica, 2005, 25(7): 881~884
于斌,彭翔. 基于级联相位恢复算法的光学图像加密[J]. 光学学报,2005, 25(7): 881~884

[7] Yuchi Liang, Gu Jihua, Liu Wei et al.. An image digital watermark technique based on digital holography and discrete cosine transform[J]. Acta Optica Sinica, 2006, 26(3): 355~361
尉迟亮,顾济华,刘薇 等. 基于数字全息及离散余弦变换的图像数字水印技术[J]. 光学学报, 2006, 26(3): 355~361

[8] Zhang Peikun, Li Yulin, Liu Jiaying et al.. Study on the rotative invariance in the phase encrypted image and the phase-ring decryption[J]. Chin. J. Lasers, 2000, 27(3): 224~228
张培琨,李育林,刘家英 等. 光学图像相位加密中旋转不变性的实现及环形相位解密[J]. 中国激光, 2000, 27(3): 224~228

[9] . . Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Opt. Lett., 2005, 30(13): 1644-1646.

[10] . . Known-plaintext attack on optical encryption based on double random phase keys[J]. Opt. Lett., 2006, 31(8): 1044-1046.

[11] . Monaghan, Thanas J. Naughton et al.. A known-plaintext heuristic attack on the Fourier plane encryption algorithm[J]. Opt. Exp., 2006, 14(8): 3181-3186.

[12] . Ciphertext-only attack on double random phase encoding optical encryption system[J]. Acta Physica Sinica, 2007, 56(5): 2639-2636.

[13] . Learning in correlators based on projections onto constraint sets[J]. Opt. Lett., 1993, 18(14): 1183-1185.

[14] . Security and encryption optical systems based on a correlator with significant output images[J]. Appl. Opt., 2000, 39(29): 5295-5301.

[15] . Hidden images in halftone pictures[J]. Appl. Opt., 2001, 40(20): 3346-3353.

[16] . . Cryptanalysis of optical security systems with significant output images[J]. Appl. Opt., 2007, 46(22): 5275-5262.

[17] Bruce Schneier. Applied Cryptography and Network Security: Principle, Algorithms, and Source Code in C[M]. New York: John Wiley & Sons Inc., 1996. 5~7

[18] . R. Fienup. Phase retrieval algorithms: a comparison[J]. Appl. Opt., 1982, 21(15): 2758-2769.

位恒政, 彭翔. 约束集投影算法和4f相关器的光学密码系统的已知明文攻击[J]. 光学学报, 2008, 28(3): 429. Wei Hengzheng, Peng Xiang. Known-Plaintext Attack on Optical Cryptosystem Based on Projection-Onto-Constraint-Sets Algorithm and a 4f Correlator[J]. Acta Optica Sinica, 2008, 28(3): 429.

本文已被 2 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!