Loading…
Vulnerability to machine learning attacks of optical encryption based on diffractive imaging
•It is experimentally demonstrated that optical encryption based on diffractive imaging is vulnerable to machine learning attacks.•Optical encryption based on diffractive imaging cannot withstand the proposed machine learning attacks.•The trained learning model can extract unknown plaintexts from th...
Saved in:
Published in: | Optics and lasers in engineering 2020-02, Vol.125, p.105858, Article 105858 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723 |
---|---|
cites | cdi_FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723 |
container_end_page | |
container_issue | |
container_start_page | 105858 |
container_title | Optics and lasers in engineering |
container_volume | 125 |
creator | Zhou, Lina Xiao, Yin Chen, Wen |
description | •It is experimentally demonstrated that optical encryption based on diffractive imaging is vulnerable to machine learning attacks.•Optical encryption based on diffractive imaging cannot withstand the proposed machine learning attacks.•The trained learning model can extract unknown plaintexts from the given ciphertexts in real time without the direct retrieval or estimate of various different optical encryption keys.•The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases.•The proposed machine learning attacks would urge the further investigation of optical encryption schemes to enhance their security.•The proposed machine learning attacks could hold the promise for further developments of the cryptanalysis of optical encryption.
In this paper, we experimentally demonstrate for the first time to our knowledge that optical encryption based on diffractive imaging is vulnerable to the attacks using learning methods. Using machine learning attack, an opponent is capable to retrieve unknown plaintexts from the given ciphertexts. The proposed method adopts end-to-end learning to extract a superior mapping relationship between the ciphertexts and the plaintexts. Without a direct retrieval or estimate of optical encryption keys, an unauthorised user can extract unknown plaintexts from the given ciphertexts by using the trained learning models. Simulations and optical experimental results demonstrate that the proposed learning method is feasible and effective to analyze the vulnerability of optical encryption schemes. The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases. Compared with conventional cryptanalytic methods, the proposed machine learning attacks can retrieve unknown plaintexts from the given ciphertexts using the trained learning models without a direct usage of various different optical encryption keys, which provides a different strategy for the cryptanalysis of optical encryption systems. @ Elsevier, 2019. |
doi_str_mv | 10.1016/j.optlaseng.2019.105858 |
format | article |
fullrecord | <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1016_j_optlaseng_2019_105858</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0143816619309881</els_id><sourcerecordid>S0143816619309881</sourcerecordid><originalsourceid>FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723</originalsourceid><addsrcrecordid>eNqFkN1KAzEQhYMoWKvPYF5ga7LZZHcvS_EPCt4Ur4QwTSY1dZstSSz07U2peOvVHAbOOTMfIfeczTjj6mE7G_d5gIRhM6sZ78tWdrK7IBPetaJigtWXZMJ4I6qOK3VNblLasuJsOJ-Qj_fvIWCEtR98PtI80h2YTx-QDggx-LChkDOYr0RHR0uTNzBQDCYeix4DXZdmS4uw3rkIJvsDUr-DTbHekisHQ8K73zklq6fH1eKlWr49vy7my8o0guWqk4K7TjlVCyPbtu17Za0DZtBCAwKkaaDFBrmSTQ0WFRPopBBd3UvW1mJK2nOsiWNKEZ3ex3JBPGrO9ImR3uo_RvrESJ8ZFef87MRy3cFj1Mn48hxaH9FkbUf_b8YPKAJ2QA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Vulnerability to machine learning attacks of optical encryption based on diffractive imaging</title><source>ScienceDirect Freedom Collection</source><creator>Zhou, Lina ; Xiao, Yin ; Chen, Wen</creator><creatorcontrib>Zhou, Lina ; Xiao, Yin ; Chen, Wen</creatorcontrib><description>•It is experimentally demonstrated that optical encryption based on diffractive imaging is vulnerable to machine learning attacks.•Optical encryption based on diffractive imaging cannot withstand the proposed machine learning attacks.•The trained learning model can extract unknown plaintexts from the given ciphertexts in real time without the direct retrieval or estimate of various different optical encryption keys.•The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases.•The proposed machine learning attacks would urge the further investigation of optical encryption schemes to enhance their security.•The proposed machine learning attacks could hold the promise for further developments of the cryptanalysis of optical encryption.
In this paper, we experimentally demonstrate for the first time to our knowledge that optical encryption based on diffractive imaging is vulnerable to the attacks using learning methods. Using machine learning attack, an opponent is capable to retrieve unknown plaintexts from the given ciphertexts. The proposed method adopts end-to-end learning to extract a superior mapping relationship between the ciphertexts and the plaintexts. Without a direct retrieval or estimate of optical encryption keys, an unauthorised user can extract unknown plaintexts from the given ciphertexts by using the trained learning models. Simulations and optical experimental results demonstrate that the proposed learning method is feasible and effective to analyze the vulnerability of optical encryption schemes. The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases. Compared with conventional cryptanalytic methods, the proposed machine learning attacks can retrieve unknown plaintexts from the given ciphertexts using the trained learning models without a direct usage of various different optical encryption keys, which provides a different strategy for the cryptanalysis of optical encryption systems. @ Elsevier, 2019.</description><identifier>ISSN: 0143-8166</identifier><identifier>EISSN: 1873-0302</identifier><identifier>DOI: 10.1016/j.optlaseng.2019.105858</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>Diffractive imaging ; Experimental demonstration ; Machine learning ; Vulnerability detection</subject><ispartof>Optics and lasers in engineering, 2020-02, Vol.125, p.105858, Article 105858</ispartof><rights>2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723</citedby><cites>FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Zhou, Lina</creatorcontrib><creatorcontrib>Xiao, Yin</creatorcontrib><creatorcontrib>Chen, Wen</creatorcontrib><title>Vulnerability to machine learning attacks of optical encryption based on diffractive imaging</title><title>Optics and lasers in engineering</title><description>•It is experimentally demonstrated that optical encryption based on diffractive imaging is vulnerable to machine learning attacks.•Optical encryption based on diffractive imaging cannot withstand the proposed machine learning attacks.•The trained learning model can extract unknown plaintexts from the given ciphertexts in real time without the direct retrieval or estimate of various different optical encryption keys.•The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases.•The proposed machine learning attacks would urge the further investigation of optical encryption schemes to enhance their security.•The proposed machine learning attacks could hold the promise for further developments of the cryptanalysis of optical encryption.
In this paper, we experimentally demonstrate for the first time to our knowledge that optical encryption based on diffractive imaging is vulnerable to the attacks using learning methods. Using machine learning attack, an opponent is capable to retrieve unknown plaintexts from the given ciphertexts. The proposed method adopts end-to-end learning to extract a superior mapping relationship between the ciphertexts and the plaintexts. Without a direct retrieval or estimate of optical encryption keys, an unauthorised user can extract unknown plaintexts from the given ciphertexts by using the trained learning models. Simulations and optical experimental results demonstrate that the proposed learning method is feasible and effective to analyze the vulnerability of optical encryption schemes. The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases. Compared with conventional cryptanalytic methods, the proposed machine learning attacks can retrieve unknown plaintexts from the given ciphertexts using the trained learning models without a direct usage of various different optical encryption keys, which provides a different strategy for the cryptanalysis of optical encryption systems. @ Elsevier, 2019.</description><subject>Diffractive imaging</subject><subject>Experimental demonstration</subject><subject>Machine learning</subject><subject>Vulnerability detection</subject><issn>0143-8166</issn><issn>1873-0302</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNqFkN1KAzEQhYMoWKvPYF5ga7LZZHcvS_EPCt4Ur4QwTSY1dZstSSz07U2peOvVHAbOOTMfIfeczTjj6mE7G_d5gIRhM6sZ78tWdrK7IBPetaJigtWXZMJ4I6qOK3VNblLasuJsOJ-Qj_fvIWCEtR98PtI80h2YTx-QDggx-LChkDOYr0RHR0uTNzBQDCYeix4DXZdmS4uw3rkIJvsDUr-DTbHekisHQ8K73zklq6fH1eKlWr49vy7my8o0guWqk4K7TjlVCyPbtu17Za0DZtBCAwKkaaDFBrmSTQ0WFRPopBBd3UvW1mJK2nOsiWNKEZ3ex3JBPGrO9ImR3uo_RvrESJ8ZFef87MRy3cFj1Mn48hxaH9FkbUf_b8YPKAJ2QA</recordid><startdate>202002</startdate><enddate>202002</enddate><creator>Zhou, Lina</creator><creator>Xiao, Yin</creator><creator>Chen, Wen</creator><general>Elsevier Ltd</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>202002</creationdate><title>Vulnerability to machine learning attacks of optical encryption based on diffractive imaging</title><author>Zhou, Lina ; Xiao, Yin ; Chen, Wen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Diffractive imaging</topic><topic>Experimental demonstration</topic><topic>Machine learning</topic><topic>Vulnerability detection</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhou, Lina</creatorcontrib><creatorcontrib>Xiao, Yin</creatorcontrib><creatorcontrib>Chen, Wen</creatorcontrib><collection>CrossRef</collection><jtitle>Optics and lasers in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhou, Lina</au><au>Xiao, Yin</au><au>Chen, Wen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Vulnerability to machine learning attacks of optical encryption based on diffractive imaging</atitle><jtitle>Optics and lasers in engineering</jtitle><date>2020-02</date><risdate>2020</risdate><volume>125</volume><spage>105858</spage><pages>105858-</pages><artnum>105858</artnum><issn>0143-8166</issn><eissn>1873-0302</eissn><abstract>•It is experimentally demonstrated that optical encryption based on diffractive imaging is vulnerable to machine learning attacks.•Optical encryption based on diffractive imaging cannot withstand the proposed machine learning attacks.•The trained learning model can extract unknown plaintexts from the given ciphertexts in real time without the direct retrieval or estimate of various different optical encryption keys.•The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases.•The proposed machine learning attacks would urge the further investigation of optical encryption schemes to enhance their security.•The proposed machine learning attacks could hold the promise for further developments of the cryptanalysis of optical encryption.
In this paper, we experimentally demonstrate for the first time to our knowledge that optical encryption based on diffractive imaging is vulnerable to the attacks using learning methods. Using machine learning attack, an opponent is capable to retrieve unknown plaintexts from the given ciphertexts. The proposed method adopts end-to-end learning to extract a superior mapping relationship between the ciphertexts and the plaintexts. Without a direct retrieval or estimate of optical encryption keys, an unauthorised user can extract unknown plaintexts from the given ciphertexts by using the trained learning models. Simulations and optical experimental results demonstrate that the proposed learning method is feasible and effective to analyze the vulnerability of optical encryption schemes. The universality of the trained learning model is also illustrated, and it is verified that the machine learning model trained by using a database is robust to be used for attacking different databases. Compared with conventional cryptanalytic methods, the proposed machine learning attacks can retrieve unknown plaintexts from the given ciphertexts using the trained learning models without a direct usage of various different optical encryption keys, which provides a different strategy for the cryptanalysis of optical encryption systems. @ Elsevier, 2019.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.optlaseng.2019.105858</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0143-8166 |
ispartof | Optics and lasers in engineering, 2020-02, Vol.125, p.105858, Article 105858 |
issn | 0143-8166 1873-0302 |
language | eng |
recordid | cdi_crossref_primary_10_1016_j_optlaseng_2019_105858 |
source | ScienceDirect Freedom Collection |
subjects | Diffractive imaging Experimental demonstration Machine learning Vulnerability detection |
title | Vulnerability to machine learning attacks of optical encryption based on diffractive imaging |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T17%3A11%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Vulnerability%20to%20machine%20learning%20attacks%20of%20optical%20encryption%20based%20on%20diffractive%20imaging&rft.jtitle=Optics%20and%20lasers%20in%20engineering&rft.au=Zhou,%20Lina&rft.date=2020-02&rft.volume=125&rft.spage=105858&rft.pages=105858-&rft.artnum=105858&rft.issn=0143-8166&rft.eissn=1873-0302&rft_id=info:doi/10.1016/j.optlaseng.2019.105858&rft_dat=%3Celsevier_cross%3ES0143816619309881%3C/elsevier_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c430t-8531f86f623c5777996ddfa0ceda4a3a5c4a7e4e16542ade603ef53382950723%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |