Full Content is available to subscribers

Subscribe/Learn More  >
Proceedings Article

Known-plaintext attack on the double phase encoding and its implementation with parallel hardware

[+] Author Affiliations
Hengzheng Wei, Xiang Peng

Tianjin Univ. (China) and Shenzhen Univ. (China)

Haitao Liu, Songlin Feng

Shanghai Institute of Microsystem and Information Technology (China)

Bruce Z. Gao

Clemson Univ.

Proc. SPIE 6837, Information Optics and Photonics Technologies II, 683703 (November 29, 2007); doi:10.1117/12.755022
Text Size: A A A
From Conference Volume 6837

  • Information Optics and Photonics Technologies II
  • Guoguang Mu; Feijun Song; Francis T. S. Yu; Suganda Jutamulia
  • Beijing, China | November 11, 2007

abstract

A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.

© (2007) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
Citation

Hengzheng Wei ; Xiang Peng ; Haitao Liu ; Songlin Feng and Bruce Z. Gao
"Known-plaintext attack on the double phase encoding and its implementation with parallel hardware", Proc. SPIE 6837, Information Optics and Photonics Technologies II, 683703 (November 29, 2007); doi:10.1117/12.755022; http://dx.doi.org/10.1117/12.755022


Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).

Figures

Tables

NOTE:
Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging & repositioning the boxes below.

Related Book Chapters

Topic Collections

Advertisement
  • Don't have an account?
  • Subscribe to the SPIE Digital Library
  • Create a FREE account to sign up for Digital Library content alerts and gain access to institutional subscriptions remotely.
Access This Proceeding
Sign in or Create a personal account to Buy this proceeding ($15 for members, $18 for non-members).
Access This Proceeding
Sign in or Create a personal account to Buy this article ($15 for members, $18 for non-members).
Access This Chapter

Access to SPIE eBooks is limited to subscribing institutions and is not available as part of a personal subscription. Print or electronic versions of individual SPIE books may be purchased via SPIE.org.