2022
DOI: 10.1364/ao.446070
|View full text |Cite
|
Sign up to set email alerts
|

Modified plaintext attacks in a session for an optical cryptosystem based on DRPE with PFS

Abstract: In this paper, the security of an optical cryptosystem based on double random phase encoding (DRPE) with perfect forward secrecy (PFS) is analyzed for a particular session. In the cryptosystem, the PFS strategy is utilized to enhance the security and key management of the traditional DRPE scheme. Our analysis reveals that the use of PFS has certain advantages in the key management approach, but the method is still vulnerable against modified plaintext attacks when the attack is performed in the same session. A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…In DRPE-based schemes, holographic [7,8] or other quantitative phase imaging techniques [9] are needed to record the complex-valued wavefront, which make their optical architectures complex. However, DRPE and DRPE-based cryptosystems are linear, which make them vulnerable to known-plaintext attack (KPA) [10,11], chosen-plaintext attack (CPA) [12,13], chosen-ciphertext attack (CCA) [14] and ciphertext-only attack(COA) [15].…”
Section: Introductionmentioning
confidence: 99%
“…In DRPE-based schemes, holographic [7,8] or other quantitative phase imaging techniques [9] are needed to record the complex-valued wavefront, which make their optical architectures complex. However, DRPE and DRPE-based cryptosystems are linear, which make them vulnerable to known-plaintext attack (KPA) [10,11], chosen-plaintext attack (CPA) [12,13], chosen-ciphertext attack (CCA) [14] and ciphertext-only attack(COA) [15].…”
Section: Introductionmentioning
confidence: 99%
“…If the compromised data are illegally used, the consequences will be even unimaginable. Therefore, image encryption technology is favored by researchers [1][2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Encryption is vital in many areas, such as social networks and health care, because of insecure networks for data transmission [37,42]. The encryption process usually converts a plain image to a noise-like image [43,44]. It is important that the attackers cannot obtain the plain image from the encrypted one.…”
Section: Introductionmentioning
confidence: 99%