Key-space analysis of double random phase encryption technique.

We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

[1]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[2]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[3]  Bahram Javidi,et al.  Influence of a perturbation in a double phase-encoding system , 1998 .

[4]  R. W. Lawrence,et al.  Digital Image Formation From Electronically Detected Holograms , 1967 .

[5]  John T. Sheridan,et al.  Optical encryption and the space bandwidth product , 2005 .

[6]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[7]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[8]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[9]  L E Brackenbury,et al.  Optical encryption of digital data. , 2000, Applied optics.

[10]  H. F. Gaines,et al.  Cryptanalysis: A Study of Ciphers and Their Solution , 1956 .

[11]  M. Unser,et al.  Complex-wave retrieval from a single off-axis hologram. , 2004, Journal of the Optical Society of America. A, Optics, image science, and vision.

[12]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[13]  David Kahn,et al.  Cryptology: Yesterday, Today, and Tomorrow , 1987 .

[14]  J R Fienup,et al.  Phase retrieval algorithms: a comparison. , 1982, Applied optics.

[15]  John T. Sheridan,et al.  Image encryption and the fractional Fourier transform , 2003 .

[16]  John T. Sheridan,et al.  Optical image encryption by random shifting in fractional Fourier domains. , 2003, Optics letters.

[17]  J. Carabello Today and Tomorrow , 1966, The Penn dental journal.

[18]  Unnikrishnan Gopinathan,et al.  Polarization encoding and multiplexing of two-dimensional signals: application to image encryption. , 2006, Applied optics.

[19]  Shutian Liu,et al.  Image encryption based on pure intensity random coding and digital holography technique , 2003 .

[20]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[21]  Thomas J. Naughton,et al.  Compression of encrypted three-dimensional objects using digital holography , 2004, SPIE OPTO-Ireland.

[22]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[23]  John T. Sheridan,et al.  Generalizing, optimizing, and inventing numerical algorithms for the fractional Fourier, Fresnel, and linear canonical transforms. , 2005, Journal of the Optical Society of America. A, Optics, image science, and vision.

[24]  U. Schnars,et al.  Direct recording of holograms by a CCD target and numerical reconstruction. , 1994, Applied optics.