2013
DOI: 10.1364/oe.21.028523
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext-only attack on a joint transform correlator encryption system

Abstract: A ciphertext-only attack (COA) on a joint transform correlator (JTC) encryption system is proposed. From the perspective view of optical cryptanalysis, we find out that the issue to be solved in the COA scheme could be transferred into a phase retrieval problem with single intensity measurement. And in this paper, the hybrid input-output (HIO) algorithm is employed to handle this issue with the help of an inartificial signal domain support and a given frequency domain constraint. Meanwhile, we provide a set of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 60 publications
(27 citation statements)
references
References 32 publications
0
25
0
1
Order By: Relevance
“…For all these reasons, we can say that the proposed nonlinear fully phase nonzeroorder JTC-based encryption system in the GD is resistant to the CPA, KPA and COA described in [23], [24] and [25], respectively.…”
Section: Chosen-plaintext Known-plaintext and Ciphertext-only Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…For all these reasons, we can say that the proposed nonlinear fully phase nonzeroorder JTC-based encryption system in the GD is resistant to the CPA, KPA and COA described in [23], [24] and [25], respectively.…”
Section: Chosen-plaintext Known-plaintext and Ciphertext-only Attacksmentioning
confidence: 99%
“…The chosen-plaintext attack (CPA) [23], the known-plaintext attack (KPA) [24] and the ciphertext-only attack (COA) [25] have proven that the JTC-based encryption systems proposed in the references [9,11,12] are vulnerable to several attacks. The encryption systems of references [9,11,12] were described in the Fourier domain with a RPM as a key.…”
Section: Chosen-plaintext Known-plaintext and Ciphertext-only Attacksmentioning
confidence: 99%
See 3 more Smart Citations