Loading…
Forgery attack on optical encryption based on computational ghost imaging
Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security v...
Saved in:
Published in: | Optics letters 2020-07, Vol.45 (14), p.3917-3920 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3 |
---|---|
cites | cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3 |
container_end_page | 3920 |
container_issue | 14 |
container_start_page | 3917 |
container_title | Optics letters |
container_volume | 45 |
creator | Yuan, Sheng Wang, Lanjie Liu, Xuemei Zhou, Xin |
description | Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system. |
doi_str_mv | 10.1364/OL.392424 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_2424098037</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2440103420</sourcerecordid><originalsourceid>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</originalsourceid><addsrcrecordid>eNpdkD9PwzAQxS0EEqUw8A0iscCQ4n-x4xFVFCpFygKz5bqXkJLGwXaGfnsclYnpTu_9dLr3ELoneEWY4M91tWKKcsov0IIUTOVcKn6JFphwkatC0Wt0E8IBYywkYwu03Tjfgj9lJkZjvzM3ZG6MnTV9BoP1p7QnaWcC7GfPuuM4RTOLiWi_XIhZdzRtN7S36KoxfYC7v7lEn5vXj_V7XtVv2_VLlVuqcMw5FqSklkm6lyUIVigjGC0osWJnhMKgQDamtGVjVLmnpbA7qkSCAKRkDbAlejzfHb37mSBEfeyChb43A7gp6Dk8ViVmMqEP_9CDm3z6fKY4JphxihP1dKasdyF4aPToUyZ_0gTruVRdV_pcKvsFC_Bobw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2440103420</pqid></control><display><type>article</type><title>Forgery attack on optical encryption based on computational ghost imaging</title><source>Jisc-Optica Publishing Group Read & Publish Agreement 2022-2024 – E Combination 1</source><creator>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</creator><creatorcontrib>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</creatorcontrib><description>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</description><identifier>ISSN: 0146-9592</identifier><identifier>EISSN: 1539-4794</identifier><identifier>DOI: 10.1364/OL.392424</identifier><language>eng</language><publisher>Washington: Optical Society of America</publisher><subject>Algorithms ; Cryptography ; Deception ; Encryption ; Forgery ; Image manipulation</subject><ispartof>Optics letters, 2020-07, Vol.45 (14), p.3917-3920</ispartof><rights>Copyright Optical Society of America Jul 15, 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</citedby><cites>FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</cites><orcidid>0000-0002-7495-7070</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27900,27901</link.rule.ids></links><search><creatorcontrib>Yuan, Sheng</creatorcontrib><creatorcontrib>Wang, Lanjie</creatorcontrib><creatorcontrib>Liu, Xuemei</creatorcontrib><creatorcontrib>Zhou, Xin</creatorcontrib><title>Forgery attack on optical encryption based on computational ghost imaging</title><title>Optics letters</title><description>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Deception</subject><subject>Encryption</subject><subject>Forgery</subject><subject>Image manipulation</subject><issn>0146-9592</issn><issn>1539-4794</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpdkD9PwzAQxS0EEqUw8A0iscCQ4n-x4xFVFCpFygKz5bqXkJLGwXaGfnsclYnpTu_9dLr3ELoneEWY4M91tWKKcsov0IIUTOVcKn6JFphwkatC0Wt0E8IBYywkYwu03Tjfgj9lJkZjvzM3ZG6MnTV9BoP1p7QnaWcC7GfPuuM4RTOLiWi_XIhZdzRtN7S36KoxfYC7v7lEn5vXj_V7XtVv2_VLlVuqcMw5FqSklkm6lyUIVigjGC0osWJnhMKgQDamtGVjVLmnpbA7qkSCAKRkDbAlejzfHb37mSBEfeyChb43A7gp6Dk8ViVmMqEP_9CDm3z6fKY4JphxihP1dKasdyF4aPToUyZ_0gTruVRdV_pcKvsFC_Bobw</recordid><startdate>20200715</startdate><enddate>20200715</enddate><creator>Yuan, Sheng</creator><creator>Wang, Lanjie</creator><creator>Liu, Xuemei</creator><creator>Zhou, Xin</creator><general>Optical Society of America</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0002-7495-7070</orcidid></search><sort><creationdate>20200715</creationdate><title>Forgery attack on optical encryption based on computational ghost imaging</title><author>Yuan, Sheng ; Wang, Lanjie ; Liu, Xuemei ; Zhou, Xin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Deception</topic><topic>Encryption</topic><topic>Forgery</topic><topic>Image manipulation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yuan, Sheng</creatorcontrib><creatorcontrib>Wang, Lanjie</creatorcontrib><creatorcontrib>Liu, Xuemei</creatorcontrib><creatorcontrib>Zhou, Xin</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>MEDLINE - Academic</collection><jtitle>Optics letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yuan, Sheng</au><au>Wang, Lanjie</au><au>Liu, Xuemei</au><au>Zhou, Xin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forgery attack on optical encryption based on computational ghost imaging</atitle><jtitle>Optics letters</jtitle><date>2020-07-15</date><risdate>2020</risdate><volume>45</volume><issue>14</issue><spage>3917</spage><epage>3920</epage><pages>3917-3920</pages><issn>0146-9592</issn><eissn>1539-4794</eissn><abstract>Attack techniques on a cryptosystem include not only cryptanalysis, but also forgery and modification of messages, deception and confusion on both sender and receiver sides, and so on. In this Letter, we show that an optical encryption system based on computational ghost imaging (CGI) has security vulnerability owing to its high tolerance for error deviation of ciphertext. It leaves a chance for a forgery attack in which attackers can forge a set of fake keys according to the intercepted ciphertext. If the forged key can be transmitted to the receiver by some disguised means, he/she may be cheated or confused by the retrieved fake images. The discovery of this vulnerability may also help upgrade the CGI-based encryption system.</abstract><cop>Washington</cop><pub>Optical Society of America</pub><doi>10.1364/OL.392424</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0002-7495-7070</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0146-9592 |
ispartof | Optics letters, 2020-07, Vol.45 (14), p.3917-3920 |
issn | 0146-9592 1539-4794 |
language | eng |
recordid | cdi_proquest_miscellaneous_2424098037 |
source | Jisc-Optica Publishing Group Read & Publish Agreement 2022-2024 – E Combination 1 |
subjects | Algorithms Cryptography Deception Encryption Forgery Image manipulation |
title | Forgery attack on optical encryption based on computational ghost imaging |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-25T02%3A47%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forgery%20attack%20on%20optical%20encryption%20based%20on%20computational%20ghost%20imaging&rft.jtitle=Optics%20letters&rft.au=Yuan,%20Sheng&rft.date=2020-07-15&rft.volume=45&rft.issue=14&rft.spage=3917&rft.epage=3920&rft.pages=3917-3920&rft.issn=0146-9592&rft.eissn=1539-4794&rft_id=info:doi/10.1364/OL.392424&rft_dat=%3Cproquest_cross%3E2440103420%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c290t-406182c372d78e6359a632521c6ba690e9e7fa8c8fa98d286cb2969a6ee773fe3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2440103420&rft_id=info:pmid/&rfr_iscdi=true |