Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry.

The optical cryptosystem based on phase-shifting interferometry (PSI) is one of the most interesting optical cryptographic schemes in recent years. However, we find that the PSI technique provides an attractive method to record the ciphertext, but contributes little to the security level of the cryptosystem. From the cryptanalysis point of view, in a certain simplified case, an attacker is only required to crack two equivalent decryption keys instead of the original random phase keys and geometric key. Moreover, a chosen-plaintext attack method is proposed, in which an impulse function is chosen as a known plaintext. By using this attack, the attacker can effectively recover any plaintext from the corresponding ciphertext. The validity of the attack is verified by computer simulations.

[1]  X. F. Meng,et al.  Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .

[2]  Lu-Zhong Cai,et al.  Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.

[3]  Cecilia La Mela,et al.  Optical encryption using phase-shifting interferometry in a joint transform correlator. , 2006, Optics letters.

[4]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[5]  Xiang Peng,et al.  Cryptanalysis of optical encryption schemes based on joint transform correlator architecture , 2011 .

[6]  Xiaogang Wang,et al.  Image encryption based on anamorphic fractional Fourier transform and three-step phase-shifting interferometry , 2006 .

[7]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[8]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[9]  B Javidi,et al.  Optoelectronic information encryption with phase-shifting interferometry. , 2000, Applied optics.

[10]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[11]  L Z Cai,et al.  Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.

[12]  B. Javidi Securing Information with Optical Technologies , 1997 .

[13]  Xiang Peng,et al.  Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys , 2009 .

[14]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[15]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[16]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[17]  Peng Xiang,et al.  Ciphertext-only attack on double random phase encoding optical encryption system , 2007 .

[18]  Ichirou Yamaguchi,et al.  Phase-shifting digital holography , 1997 .

[19]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[20]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[21]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[22]  Hsuan T Chang,et al.  Multiple-phase retrieval for optical security systems by use of random-phase encoding. , 2002, Applied optics.

[23]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.