Loading…

Forgery attack on optical encryption based on computational ghost imaging

Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security v...

Full description

Saved in:
Bibliographic Details
Published in:Optics letters 2020-07, Vol.45 (14), p.3917-3920
Main Authors: Yuan, Sheng, Wang, Lanjie, Liu, Xuemei, Zhou, Xin
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3
cites cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3
container_end_page 3920
container_issue 14
container_start_page 3917
container_title Optics letters
container_volume 45
creator Yuan, Sheng
Wang, Lanjie
Liu, Xuemei
Zhou, Xin
description Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.
doi_str_mv 10.1364/OL.392424
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2424098037</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2440103420</sourcerecordid><originalsourceid>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</originalsourceid><addsrcrecordid>eNpdkD9PwzAQxS0EEqUw8A0iscCQ4n-x4xFVFCpFygKz5bqXkJLGwXaGfnsclYnpTu_9dLr3ELoneEWY4M91tWKKcsov0IIUTOVcKn6JFphwkatC0Wt0E8IBYywkYwu03Tjfgj9lJkZjvzM3ZG6MnTV9BoP1p7QnaWcC7GfPuuM4RTOLiWi_XIhZdzRtN7S36KoxfYC7v7lEn5vXj_V7XtVv2_VLlVuqcMw5FqSklkm6lyUIVigjGC0osWJnhMKgQDamtGVjVLmnpbA7qkSCAKRkDbAlejzfHb37mSBEfeyChb43A7gp6Dk8ViVmMqEP_9CDm3z6fKY4JphxihP1dKasdyF4aPToUyZ_0gTruVRdV_pcKvsFC_Bobw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2440103420</pqid></control><display><type>article</type><title>Forgery attack on optical encryption based on computational ghost imaging</title><source>Jisc-Optica Publishing Group Read &amp; Publish Agreement 2022-2024 – E Combination 1</source><creator>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</creator><creatorcontrib>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</creatorcontrib><description>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</description><identifier>ISSN: 0146-9592</identifier><identifier>EISSN: 1539-4794</identifier><identifier>DOI: 10.1364/OL.392424</identifier><language>eng</language><publisher>Washington: Optical Society of America</publisher><subject>Algorithms ; Cryptography ; Deception ; Encryption ; Forgery ; Image manipulation</subject><ispartof>Optics letters, 2020-07, Vol.45 (14), p.3917-3920</ispartof><rights>Copyright Optical Society of America Jul 15, 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</citedby><cites>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</cites><orcidid>0000-0002-7495-7070</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27900,27901</link.rule.ids></links><search><creatorcontrib>Yuan, Sheng</creatorcontrib><creatorcontrib>Wang, Lanjie</creatorcontrib><creatorcontrib>Liu, Xuemei</creatorcontrib><creatorcontrib>Zhou, Xin</creatorcontrib><title>Forgery attack on optical encryption based on computational ghost imaging</title><title>Optics letters</title><description>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Deception</subject><subject>Encryption</subject><subject>Forgery</subject><subject>Image manipulation</subject><issn>0146-9592</issn><issn>1539-4794</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpdkD9PwzAQxS0EEqUw8A0iscCQ4n-x4xFVFCpFygKz5bqXkJLGwXaGfnsclYnpTu_9dLr3ELoneEWY4M91tWKKcsov0IIUTOVcKn6JFphwkatC0Wt0E8IBYywkYwu03Tjfgj9lJkZjvzM3ZG6MnTV9BoP1p7QnaWcC7GfPuuM4RTOLiWi_XIhZdzRtN7S36KoxfYC7v7lEn5vXj_V7XtVv2_VLlVuqcMw5FqSklkm6lyUIVigjGC0osWJnhMKgQDamtGVjVLmnpbA7qkSCAKRkDbAlejzfHb37mSBEfeyChb43A7gp6Dk8ViVmMqEP_9CDm3z6fKY4JphxihP1dKasdyF4aPToUyZ_0gTruVRdV_pcKvsFC_Bobw</recordid><startdate>20200715</startdate><enddate>20200715</enddate><creator>Yuan, Sheng</creator><creator>Wang, Lanjie</creator><creator>Liu, Xuemei</creator><creator>Zhou, Xin</creator><general>Optical Society of America</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0002-7495-7070</orcidid></search><sort><creationdate>20200715</creationdate><title>Forgery attack on optical encryption based on computational ghost imaging</title><author>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Deception</topic><topic>Encryption</topic><topic>Forgery</topic><topic>Image manipulation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuan, Sheng</creatorcontrib><creatorcontrib>Wang, Lanjie</creatorcontrib><creatorcontrib>Liu, Xuemei</creatorcontrib><creatorcontrib>Zhou, Xin</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>MEDLINE - Academic</collection><jtitle>Optics letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuan, Sheng</au><au>Wang, Lanjie</au><au>Liu, Xuemei</au><au>Zhou, Xin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forgery attack on optical encryption based on computational ghost imaging</atitle><jtitle>Optics letters</jtitle><date>2020-07-15</date><risdate>2020</risdate><volume>45</volume><issue>14</issue><spage>3917</spage><epage>3920</epage><pages>3917-3920</pages><issn>0146-9592</issn><eissn>1539-4794</eissn><abstract>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</abstract><cop>Washington</cop><pub>Optical Society of America</pub><doi>10.1364/OL.392424</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0002-7495-7070</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0146-9592
ispartof Optics letters, 2020-07, Vol.45 (14), p.3917-3920
issn 0146-9592
1539-4794
language eng
recordid cdi_proquest_miscellaneous_2424098037
source Jisc-Optica Publishing Group Read & Publish Agreement 2022-2024 – E Combination 1
subjects Algorithms
Cryptography
Deception
Encryption
Forgery
Image manipulation
title Forgery attack on optical encryption based on computational ghost imaging
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-25T02%3A47%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forgery%20attack%20on%20optical%20encryption%20based%20on%20computational%20ghost%20imaging&rft.jtitle=Optics%20letters&rft.au=Yuan,%20Sheng&rft.date=2020-07-15&rft.volume=45&rft.issue=14&rft.spage=3917&rft.epage=3920&rft.pages=3917-3920&rft.issn=0146-9592&rft.eissn=1539-4794&rft_id=info:doi/10.1364/OL.392424&rft_dat=%3Cproquest_cross%3E2440103420%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2440103420&rft_id=info:pmid/&rfr_iscdi=true