Collision in Fresnel domain asymmetric cryptosystem using phase truncation and authentication verification

Abstract. Collision is a phenomenon in which two distinct inputs produce an identical output, so if an attacker finds the encryption keys in such a way that when it is applied to an encrypted image, it produces an arbitrary image instead of original one. We propose collision in an asymmetric cryptosystem based on a phase-truncated Fresnel transform. For encryption, instead of using conventional random-phase masks, structured phase masks with desired construction parameters are used. The decryption keys are generated using the amplitude and phase truncation. An attacker generates an arbitrary (collision) image from the encrypted image using a modified Gerchberg-Saxton phase retrieval algorithm. Two different users, authorized and unauthorized user (attacker), can claim the retrieved image as the original data. The authorized user uses the correct decryption keys and retrieves the original image, while an unauthorized user uses the generated keys and retrieves the collision image. In order to verify the authenticity of the retrieved data, a joint transform correlator is used. A sharp auto-correlation peak is obtained when an image retrieved by authorized user is matched with the encrypted image. However, cross-correlation is obtained when an encrypted image is matched with the collision image. Results of computer simulation support the idea of the proposed collision.

[1]  Hone-Ene Hwang,et al.  Position multiplexing multiple-image encryption using cascaded phase-only masks in Fresnel transform domain , 2011 .

[2]  Wen-Nung Lie,et al.  Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain. , 2009, Optics letters.

[3]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[4]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[5]  B Javidi,et al.  Encrypted optical memory system using three-dimensional keys in the Fresnel domain. , 1999, Optics letters.

[6]  D Mendlovic,et al.  Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain. , 1996, Optics letters.

[7]  Bahram Javidi,et al.  Resistance of the double random phase encryption against various attacks. , 2007, Optics express.

[8]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[9]  Wolfgang Osten,et al.  Strategy for cryptanalysis of optical encryption in the Fresnel domain. , 2010, Applied optics.

[10]  Unnikrishnan Gopinathan,et al.  Cryptanalysis of optical security systems with significant output images. , 2007, Applied optics.

[11]  Naveen K Nishchal,et al.  Image encryption based on interference that uses fractional Fourier domain asymmetric keys. , 2012, Applied optics.

[12]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[13]  Bahram Javidi,et al.  Information hiding technique with double phase encoding. , 2002, Applied optics.

[14]  Naveen K. Nishchal,et al.  Binary differential joint-transform correlator based on a ferroelectric-liquid-crystal electrically addressed spatial light modulator , 2006 .

[15]  John T. Sheridan,et al.  Collision in double random phase encoding , 2008 .

[16]  Xiaogang Wang,et al.  Double-image self-encoding and hiding based on phase-truncated Fourier transforms and phase retrieval , 2011 .

[17]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[18]  Xiaogang Wang,et al.  Security enhancement of a phase-truncation based image encryption algorithm. , 2011, Applied optics.

[19]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[20]  Wolfgang Osten,et al.  Collision in double-phase encryption based on fractional Fourier transform , 2009, International Conference on Optical Instruments and Technology.

[21]  John Fredy Barrera,et al.  Optical encryption method using toroidal zone plates , 2005 .

[22]  Xiaogang Wang,et al.  Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .

[23]  John T. Sheridan,et al.  Random phase and jigsaw encryption in the Fresnel domain , 2004 .

[24]  Naveen K. Nishchal,et al.  Digital Fresnel hologram watermarking , 2010, 2010 9th Euro-American Workshop on Information Optics.

[25]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[26]  Jingjuan Zhang,et al.  Position multiplexing for multiple-image encryption , 2006 .

[27]  Daomu Zhao,et al.  Double images encryption method with resistance against the specific attack based on an asymmetric algorithm. , 2012, Optics express.

[28]  Naveen K Nishchal,et al.  Asymmetric color cryptosystem using polarization selective diffractive optical element and structured phase mask. , 2012, Applied optics.

[29]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[30]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[31]  Bahram Javidi,et al.  3D object watermarking by a 3D hidden object. , 2003, Optics express.

[32]  John Fredy Barrera,et al.  Fault tolerances using toroidal zone plate encryption , 2005 .

[33]  Daomu Zhao,et al.  Single-channel color image encryption based on asymmetric cryptosystem , 2012 .

[34]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.