LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Known-plaintext attack-based analysis of double random phase encoding using multiple known plaintext-ciphertext pairs.

Photo from wikipedia

Double random phase encoding (DRPE) is vulnerable to known-plaintext attacks (KPAs) based on phase retrieval algorithms. We previously analyzed DRPE resistance to KPA cryptanalysis with multiple known plaintext-ciphertext image pairs… Click to show full abstract

Double random phase encoding (DRPE) is vulnerable to known-plaintext attacks (KPAs) based on phase retrieval algorithms. We previously analyzed DRPE resistance to KPA cryptanalysis with multiple known plaintext-ciphertext image pairs and obtained secret keys at a higher probability rate than when performing KPA cryptanalysis using one known image pair. However, the robustness of KPA in the presence of noise or occlusion in DRPE is unclear. We analyzed KPA properties in relation to DRPE when white Gaussian noise was gradually added to the Fourier amplitude or phase of a known ciphertext complex amplitude image. Additionally, we analyzed KPA properties when the Fourier phase of the known ciphertext image was gradually occluded by zero-valued pixels. The results showed that KPAs performed using multiple known plaintext-ciphertext image pairs were largely affected by noise added to the Fourier phase and thus are not always a strong tool for DRPE cryptanalysis.

Keywords: double random; known plaintext; multiple known; phase; plaintext ciphertext; image

Journal Title: Applied optics
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.