Loading…

Forgery attack on optical encryption based on computational ghost imaging

Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security v...

Full description

Saved in:
Bibliographic Details
Published in:Optics letters 2020-07, Vol.45 (14), p.3917-3920
Main Authors: Yuan, Sheng, Wang, Lanjie, Liu, Xuemei, Zhou, Xin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.
ISSN:0146-9592
1539-4794
DOI:10.1364/OL.392424