Chosen-plaintext attack on a joint transform correlator encrypting system

We demonstrate that optical encryption methods based on the joint transform correlator architecture are vulnerable to chosen-plaintext attack. An unauthorized user, who introduces three chosen plaintexts in the accessible encryption machine, can obtain the security key code mask. In this contribution, we also propose an alternative method to eliminate ambiguities that allows obtaining the right decrypting key.

[1]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[2]  B Javidi,et al.  Encrypted optical storage with angular multiplexing. , 1999, Applied optics.

[3]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[4]  Myrian Tebaldi,et al.  Multiple image encryption using an aperture-modulated optical system , 2006 .

[5]  Myrian Tebaldi,et al.  Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .

[6]  John Fredy Barrera,et al.  Optical encryption with a reference wave in a joint transform correlator architecture , 2009 .

[7]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[8]  Kehar Singh,et al.  Impulse attack-free four random phase mask encryption based on a 4-f optical system. , 2009, Applied optics.

[9]  John Fredy Barrera,et al.  Lateral shift multiplexing with a modified random mask in a joint transform correlator encrypting architecture , 2009 .

[10]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[11]  G Unnikrishnan,et al.  Optical encryption system that uses phase conjugation in a photorefractive crystal. , 1998, Applied optics.

[12]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[13]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[14]  L Z Cai,et al.  Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.

[15]  Dafne Amaya,et al.  Digital color encryption using a multi-wavelength approach and a joint transform correlator , 2008 .

[16]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[17]  Myrian Tebaldi,et al.  Multiple-encoding retrieval for optical security , 2007 .

[18]  Myrian Tebaldi,et al.  Multiplexing encrypted data by using polarized light , 2006 .

[19]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[20]  Russ Housley,et al.  Security flaws in 802.11 data link protocols , 2003, CACM.

[21]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[22]  Dafne Amaya,et al.  Multichanneled puzzle-like encryption , 2008 .

[23]  B Javidi,et al.  Optical encryption system with a binary key code. , 2000, Applied optics.

[24]  Dafne Amaya,et al.  Multichanneled encryption via a joint transform correlator architecture. , 2008, Applied optics.

[25]  Dafne Amaya,et al.  Wavelength multiplexing encryption using joint transform correlator architecture. , 2009, Applied optics.