Abstract

We analyze and present an attack scheme of the asymmetric optical cryptosystem proposed recently based on coherent superposition and equal modulus decomposition [Opt. Lett. 40, 475 (2015) [CrossRef]  ]. We prove that the attacker can recover the original image with the ciphertext and public keys through the amplitude-phase retrieval algorithm by using two constraints. One constraint of the amplitude-phase retrieval algorithm is the public key and the other is obtained through the analysis of the cryptosystem. The simulation results demonstrate the feasibility of the attack method.

© 2015 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
New method of attack and security enhancement on an asymmetric cryptosystem based on equal modulus decomposition

Yong Wang, Chenggen Quan, and Cho Jui Tay
Appl. Opt. 55(4) 679-686 (2016)

Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

Xiaogang Wang, Yixiang Chen, Chaoqing Dai, and Daomu Zhao
Appl. Opt. 53(2) 208-213 (2014)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (4)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (15)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription