Asymmetric optical cryptosystem based on modulus decomposition in Fresnel domain
We propose a scheme of attacking the pure phase asymmetric optical cryptosystem based on equal modulus decomposition (EMD) method. The cryptosystem is proven to be vulnerable to our modified iterative algorithm, even though the applying of phase encoding can reduce the constrain conditions. Furtherm...
Saved in:
| Published in: | Optics communications Vol. 402; pp. 302 - 310 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.11.2017
|
| Subjects: | |
| ISSN: | 0030-4018, 1873-0310 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | We propose a scheme of attacking the pure phase asymmetric optical cryptosystem based on equal modulus decomposition (EMD) method. The cryptosystem is proven to be vulnerable to our modified iterative algorithm, even though the applying of phase encoding can reduce the constrain conditions. Furthermore, since that the improvement of system space asymmetry and key variety is an effective way to further enhance the security, we have proposed an asymmetric cryptosystem based on modulus decomposition in Fresnel domain. Compared with traditional asymmetric cryptosystem in Fourier domain, the combination with Fresnel transform cannot only simplify the system, but also improve the space asymmetry and introduce the geometric parameters as security keys. Numerical simulations are performed to demonstrate the feasibility and security of the proposed cryptosystem. In addition, several exemplary schemes for security-enhanced asymmetric cryptosystems are presented, which may bring profound illumination to many deeper researches in asymmetric optical cryptosystem.
•Present cryptanalysis of EMD-based pure phase asymmetric cryptosystem.•Propose a lensless asymmetric cryptosystem based on modulus decomposition.•The space asymmetry and key variety are greatly improved in Fresnel domain.•Security is powerfully supported by the large space asymmetry and key variety.•Two exemplary schemes are presented to further improve the security. |
|---|---|
| ISSN: | 0030-4018 1873-0310 |
| DOI: | 10.1016/j.optcom.2017.05.035 |