2010
DOI: 10.1364/ol.35.003553
|View full text |Cite
|
Sign up to set email alerts
|

Known-plaintext attack on a joint transform correlator encrypting system

Abstract: We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
61
0
1

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 78 publications
(62 citation statements)
references
References 8 publications
0
61
0
1
Order By: Relevance
“…Section 2 describes the proposed nonlinear JTCbased encryption system in the FrD and presents some numerical experiments to illustrate the proposal. Section 3 specifies the system resistance against CPA [26] and KPA [27]. The results presented and discussed in the paper lead us to outline the conclusions in Section 4.…”
Section: Introductionmentioning
confidence: 98%
See 2 more Smart Citations
“…Section 2 describes the proposed nonlinear JTCbased encryption system in the FrD and presents some numerical experiments to illustrate the proposal. Section 3 specifies the system resistance against CPA [26] and KPA [27]. The results presented and discussed in the paper lead us to outline the conclusions in Section 4.…”
Section: Introductionmentioning
confidence: 98%
“…This weakness is due to the linear property of the DRPE scheme [24]. The DRPE implemented by means of a JTC is also vulnerable to CPA [26] and KPA [27]. Finally, the optical DRPE in the FrD proposed in [3][4][5] is also vulnerable to plaintext attacks [28,29].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…2, we sequentially show (a) the input object, (b) the encrypted object, (c) the result of decrypting but using an invalid key, and (d) the correct recovered object observing the inherent speckle noise all over the image. Obviously, the speckle noise is unavoidable when employing optical encryption with DRPE under any architecture, domain, or protocol [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]. …”
Section: Optical Encryptionmentioning
confidence: 99%
“…Validation and watermarking were also branches derived from the encrypting proposals [15,16]. Besides, the resistance to hacker attacks was analyzed to look for weaknesses and to reinforce the encrypting strength [17][18][19]. Common to these proposals are the recognized capabilities of protecting information the optics brings, as alternatives to previous well established methodologies.…”
Section: Introductionmentioning
confidence: 99%