Optical Cryptanalysis Method Using Wavefront Shaping

Optical techniques for information security have drawn a lot of attention in recent years. The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. However, most of the present publications on cryptanalysis of optical cryptosystems are focusin...

Full description

Bibliographic Details
Main Authors: Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7837597/
_version_ 1818718099371720704
author Meihua Liao
Dajiang Lu
Wenqi He
Xiang Peng
author_facet Meihua Liao
Dajiang Lu
Wenqi He
Xiang Peng
author_sort Meihua Liao
collection DOAJ
description Optical techniques for information security have drawn a lot of attention in recent years. The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. However, most of the present publications on cryptanalysis of optical cryptosystems are focusing only on theoretical analysis but not on experimental verification. In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. In such a way, the confusion and diffusion of the random phase mask(s) in the cryptosystem could be removed successfully. To the best of our knowledge, this is the first time the attack strategy from the perspective of wavefront shaping can be seen, and one of the biggest advantages is that it could get an equivalent key of the cryptosystem without deducing its original keys.
first_indexed 2024-12-17T19:45:40Z
format Article
id doaj.art-19f0a929db5545b68af81351e412ca36
institution Directory Open Access Journal
issn 1943-0655
language English
last_indexed 2024-12-17T19:45:40Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Photonics Journal
spelling doaj.art-19f0a929db5545b68af81351e412ca362022-12-21T21:34:53ZengIEEEIEEE Photonics Journal1943-06552017-01-019111310.1109/JPHOT.2017.26618097837597Optical Cryptanalysis Method Using Wavefront ShapingMeihua Liao0Dajiang Lu1Wenqi He2Xiang Peng3College of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen, ChinaCollege of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen, ChinaCollege of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen, ChinaCollege of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen, ChinaOptical techniques for information security have drawn a lot of attention in recent years. The development of cryptanalysis strategies will also have a positive promotion for the cryptosystems themselves. However, most of the present publications on cryptanalysis of optical cryptosystems are focusing only on theoretical analysis but not on experimental verification. In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. In such a way, the confusion and diffusion of the random phase mask(s) in the cryptosystem could be removed successfully. To the best of our knowledge, this is the first time the attack strategy from the perspective of wavefront shaping can be seen, and one of the biggest advantages is that it could get an equivalent key of the cryptosystem without deducing its original keys.https://ieeexplore.ieee.org/document/7837597/Focusinginformation securityoptical feedbackscattering.
spellingShingle Meihua Liao
Dajiang Lu
Wenqi He
Xiang Peng
Optical Cryptanalysis Method Using Wavefront Shaping
IEEE Photonics Journal
Focusing
information security
optical feedback
scattering.
title Optical Cryptanalysis Method Using Wavefront Shaping
title_full Optical Cryptanalysis Method Using Wavefront Shaping
title_fullStr Optical Cryptanalysis Method Using Wavefront Shaping
title_full_unstemmed Optical Cryptanalysis Method Using Wavefront Shaping
title_short Optical Cryptanalysis Method Using Wavefront Shaping
title_sort optical cryptanalysis method using wavefront shaping
topic Focusing
information security
optical feedback
scattering.
url https://ieeexplore.ieee.org/document/7837597/
work_keys_str_mv AT meihualiao opticalcryptanalysismethodusingwavefrontshaping
AT dajianglu opticalcryptanalysismethodusingwavefrontshaping
AT wenqihe opticalcryptanalysismethodusingwavefrontshaping
AT xiangpeng opticalcryptanalysismethodusingwavefrontshaping