scispace - formally typeset
Journal ArticleDOI

Improved method of attack on an asymmetric cryptosystem based on phase-truncated Fourier transform

Yong Wang, +2 more
- 01 Aug 2015 - 
- Vol. 54, Iss: 22, pp 6874-6881
TLDR
An improved method of attack on an asymmetric cryptosystem based on a phase-truncated Fourier transform is proposed, which not only enhances the security of the system but also does not require truncated phases.
Abstract
We propose an improved method of attack on an asymmetric cryptosystem based on a phase-truncated Fourier transform. With the proposed method of attack, an attacker is able to access the exact decryption keys and obtain precise attack results. The method is based on a novel median-filtering phase-retrieval algorithm. Compared with existing attacks, the proposed attack has the following advantages: (1) exact information of the original image can be obtained in gray-scale and binary forms; (2) better computing efficiency; (3) more robust against noise and occlusion contaminations. Numerical simulation results show the effectiveness and robustness of the proposed method. Based on the proposed method of attack, we further propose a new cryptosystem, which not only enhances the security of the system but also does not require truncated phases.

read more

Citations
More filters
Journal ArticleDOI

Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm

TL;DR: The results illustrate that the computing efficiency of the proposed method is improved and the number of iterations required is much less than that of the cryptosystem based on the Yang–Gu algorithm.
Journal ArticleDOI

Asymmetric optical cryptosystem for color image based on equal modulus decomposition in gyrator transform domains

TL;DR: An enhanced asymmetric cryptosystem for color image is proposed by using equal modulus decomposition (EMD) in the gyrator transform domains by using the Baker mapping for scrambling the RGB components of the color image.
Journal ArticleDOI

Devil׳s vortex Fresnel lens phase masks on an asymmetric cryptosystem based on phase-truncation in gyrator wavelet transform domain

TL;DR: The mother wavelet family, DVFL and gyrator transform orders associated with the GWT are extra keys that cause difficulty to an attacker so the scheme is more secure as compared to conventional techniques.
Journal ArticleDOI

New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition

TL;DR: This paper has shown that the proposed asymmetric cryptosystem is vulnerable to a newly designed attack that is able to access the exact private key and obtain precise attack results using a phase retrieval algorithm.
Journal ArticleDOI

Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition

TL;DR: The independent parameters of the 2D non-separable canonical transform enlarge the key-space of the proposed scheme and enhance robustness against brute-force attack.
References
More filters
Journal ArticleDOI

Optical image encryption based on input plane and Fourier plane random encoding.

TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Journal ArticleDOI

Optical encryption by double-random phase encoding in the fractional Fourier domain.

TL;DR: An optical architecture that encodes a primary image to stationary white noise by using two statistically independent random phase codes that has an enhanced security value compared with earlier methods is proposed.
Journal ArticleDOI

Double random-phase encoding in the Fresnel domain

TL;DR: A lensless optical security system based on double random-phase encoding in the Fresnel domain is proposed, which can encrypt a primary image to random noise by use of two statistically independent random- phase masks in the input and transform planes, respectively.
Journal ArticleDOI

Known-plaintext attack on optical encryption based on double random phase keys

TL;DR: A new approach to known-plaintext attack on an optical encryption scheme based on double random phase keys that can be accessed with the help of the phase retrieval technique is demonstrated.
Journal ArticleDOI

Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys.

TL;DR: It is shown how optical encryption methods based on double random phase keys are vulnerable to an organized attack of the chosen-ciphertext type and cast doubts on the present security of these techniques.
Related Papers (5)