Abstract

The modified iterative phase retrieval algorithms developed in Part I [Guo et al., Appl. Opt. 54, 4698 (2015) [CrossRef]  ] are applied to perform known plaintext and ciphertext attacks on amplitude encoding and phase encoding Fourier-transform-based double random phase encryption (DRPE) systems. It is shown that the new algorithms can retrieve the two random phase keys (RPKs) perfectly. The performances of the algorithms are tested by using the retrieved RPKs to decrypt a set of different ciphertexts encrypted using the same RPKs. Significantly, it is also shown that the DRPE system is, under certain conditions, vulnerable to ciphertext-only attack, i.e., in some cases an attacker can decrypt DRPE data successfully when only the ciphertext is intercepted.

© 2015 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems

Changliang Guo, Inbarasan Muniraj, and John T. Sheridan
Appl. Opt. 55(17) 4720-4728 (2016)

Iterative phase retrieval algorithms. I: optimization

Changliang Guo, Shi Liu, and John T. Sheridan
Appl. Opt. 54(15) 4698-4708 (2015)

Phase retrieval for attacking fractional Fourier transform encryption

Dezhao Kong, Xueju Shen, Liangcai Cao, and Guofan Jin
Appl. Opt. 56(12) 3449-3456 (2017)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (17)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Tables (3)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (16)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription