Abstract

We propose an improved method of attack on an asymmetric cryptosystem based on a phase-truncated Fourier transform. With the proposed method of attack, an attacker is able to access the exact decryption keys and obtain precise attack results. The method is based on a novel median-filtering phase-retrieval algorithm. Compared with existing attacks, the proposed attack has the following advantages: (1) exact information of the original image can be obtained in gray-scale and binary forms; (2) better computing efficiency; (3) more robust against noise and occlusion contaminations. Numerical simulation results show the effectiveness and robustness of the proposed method. Based on the proposed method of attack, we further propose a new cryptosystem, which not only enhances the security of the system but also does not require truncated phases.

© 2015 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

Xiaogang Wang, Yixiang Chen, Chaoqing Dai, and Daomu Zhao
Appl. Opt. 53(2) 208-213 (2014)

New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition

Yong Wang, Chenggen Quan, and Cho Jui Tay
Appl. Opt. 55(4) 679-686 (2016)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (12)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (21)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription