Cryptanalysis of an "asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition".

We analyze and present an attack scheme of the asymmetric optical cryptosystem proposed recently based on coherent superposition and equal modulus decomposition [Opt. Lett.40, 475 (2015)OPLEDP0146-959210.1364/OL.40.000475]. We prove that the attacker can recover the original image with the ciphertext and public keys through the amplitude-phase retrieval algorithm by using two constraints. One constraint of the amplitude-phase retrieval algorithm is the public key and the other is obtained through the analysis of the cryptosystem. The simulation results demonstrate the feasibility of the attack method.

[1]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[2]  Guo-Zhen Yang,et al.  THEORY OF THE AMPLITUDE-PHASE RETRIEVAL IN ANY LINEAR TRANSFORM SYSTEM AND ITS APPLICATIONS , 1993 .

[3]  Yixiang Chen,et al.  Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform. , 2014, Applied optics.

[4]  Si-Min Li,et al.  Security enhancement of double-random phase encryption by iterative algorithm , 2014 .

[5]  G. Unnikrishnan,et al.  Optical encryption by double-random phase encoding in the fractional Fourier domain. , 2000, Optics letters.

[6]  Wei Liu,et al.  Asymmetric cryptosystem by using modular arithmetic operation based on double random phase encoding , 2013 .

[7]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[8]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[9]  Xiangling Ding,et al.  Security improvement for asymmetric cryptosystem based on spherical wave illumination. , 2013, Applied optics.

[10]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[11]  Zhengjun Liu,et al.  Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm. , 2013, Optics letters.

[12]  Quanying Wu,et al.  Information encryption in phase space. , 2015, Optics letters.

[13]  Unnikrishnan Gopinathan,et al.  A known-plaintext heuristic attack on the Fourier plane encryption algorithm. , 2006, Optics express.

[14]  Zhengjun Liu,et al.  Random fractional Fourier transform. , 2007, Optics letters.

[15]  X C Cheng,et al.  Security enhancement of double-random phase encryption by amplitude modulation. , 2008, Optics letters.

[16]  Chenggong Zhang,et al.  Ciphertext-only attack on a joint transform correlator encryption system. , 2013, Optics express.

[17]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[18]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[19]  Xiaogang Wang,et al.  A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms , 2012 .

[20]  Ming Lei,et al.  Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition. , 2015, Optics letters.

[21]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[22]  S Liu,et al.  Optical image encryption with multistage and multichannel fractional Fourier-domain filtering. , 2001, Optics letters.