Advanced SearchSearch Tips
Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES
Jeon, Seok Hee; Gil, Sang Keun;
  PDF(new window)
In this paper, an optical implementation of a novel asymmetrical cryptosystem combined with D-H secret key sharing and triple DES is proposed. The proposed optical cryptosystem is realized by performing free-space interconnected optical logic operations such as AND, OR and XOR which are implemented in Mach-Zehnder type interferometer architecture. The advantage of the proposed optical architecture provides dual outputs simultaneously, and the encryption optical setup can be used as decryption optical setup only by changing the inputs of SLMs. The proposed cryptosystem can provide higher security strength than the conventional electronic algorithm, because the proposed method uses 2-D array data, which can increase the key length surprisingly and uses 3DES algorithm, which protects against “meet in the middle” attacks. Another advantage of the proposed asymmetrical cryptosystem is that it is free to change the user’s two private random numbers in generating the public keys at any time. Numerical simulation and performance analysis verify that the proposed asymmetric cryptosystem is effective and robust against attacks for the asymmetrical cipher system.
Optical encryption;Optical logic;Diffie-Hellman secret key;Asymmetrical public key;Triple DES;
 Cited by
Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation,;;;;

Journal of the Optical Society of Korea, 2016. vol.20. 4, pp.476-480 crossref(new window)
Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation, Journal of the Optical Society of Korea, 2016, 20, 4, 476  crossref(new windwow)
Multiple-3D-object decryption based on one interference using two phase-only functions, Applied Optics, 2017, 56, 22, 6214  crossref(new windwow)
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. on Info. Theory 22, 644-654 (1976). crossref(new window)

W. C Barker and E. Barker, “Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher,” NIST Special Publication 800-67, Revision 1 (2012).

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” ACM 21, 120-126 (1978). crossref(new window)

B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994). crossref(new window)

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995). crossref(new window)

D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999). crossref(new window)

E. Cuche, F. Bevilacqua, and C. Depeursinge, “Digital holography for quantitative phase-contrast imaging,” Opt. Lett. 24, 291-293 (1999). crossref(new window)

G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000). crossref(new window)

G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003). crossref(new window)

B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239-2249 (2004). crossref(new window)

G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115-122 (2004). crossref(new window)

S. H. Jeon, Y. G. Hwang, and S. K. Gil, “Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method,” Opt. Rev. 15, 181-186 (2008). crossref(new window)

I.-H. Lee and M. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014). crossref(new window)

J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, “Optical image encryption based on XOR operations,” Opt. Eng. 38, 47-54 (1999). crossref(new window)

C.-M. Shim and S.-J. Kim, “Image encryption using modified exclusive-OR rules and phase-wrapping technique,” Opt. Commun. 254, 67-75 (2005). crossref(new window)

S. K. Gil, “Optical CBC block encryption method using free space parallel processing of XOR operations,” Korean J. Opt. Photon. (Hankook Kwanghak Hoeji) 24, 262-270 (2013). crossref(new window)

S. H. Jeon and S. K. Gil, “Optical implementation of triple DES algorithm based on dual XOR logic operations,” J. Opt. Soc. Korea 17, 362-370 (2013). crossref(new window)

S. H. Jeon and S. K. Gil, “Optical secret key sharing method based on Diffie-Hellman key exchange algorithm,” J. Opt. Soc. Korea 18, 477-484 (2014). crossref(new window)