DOI QR코드

DOI QR Code

Asymmetric Public Key Cryptography by Using Logic-based Optical Processing

Gil, Sang Keun

  • Received : 2015.09.08
  • Accepted : 2015.12.10
  • Published : 2016.02.25

Abstract

In this paper, a new asymmetric public key cryptography based on the modified RSA algorithm is proposed by using logic-based optical processing. The proposed asymmetric public key algorithm is realized into an optical schematic, where AND, OR and XOR logic operations are implemented by using free space digital optics architecture. Schematically, the proposed optical configuration has an advantage of generating the public keys simultaneously. Another advantage is that the suggested optical setup can also be used for message encryption and decryption by simply replacing data inputs of SLMs in the optical configuration. The last merit is that the optical configuration has a 2-D array data format which can increase the key length easily. This can provide longer 2-D key length resulting in a higher security cryptosystem than the conventional 1-D key length cryptosystem. Results of numerical simulation and differential cryptanalysis are presented to verify that the proposed method shows the effectiveness in the optical asymmetric cryptographic system.

Keywords

Optical encryption;Optical logic;RSA cryptosystem;Asymmetrical public key;Cryptography

References

  1. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. on Inf. Theory 22, 644-654 (1976). https://doi.org/10.1109/TIT.1976.1055638
  2. W. C. Barker and E. Barker, “Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher,” NIST Special Publication 800-67, Revision 1 (2012).
  3. R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” ACM 21, 120-126 (1978). https://doi.org/10.1145/359340.359342
  4. B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994). https://doi.org/10.1117/12.170736
  5. J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995). https://doi.org/10.1364/AO.34.006012
  6. P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  7. G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000). https://doi.org/10.1117/1.1313498
  8. B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998). https://doi.org/10.1117/1.601645
  9. D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999). https://doi.org/10.1117/1.602062
  10. E. Cuche, F. Bevilacqua, and C. Depeursinge, “Digital holography for quantitative phase-contrast imaging,” Opt. Lett. 24, 291-293 (1999). https://doi.org/10.1364/OL.24.000291
  11. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003). https://doi.org/10.1117/1.1588660
  12. B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239-2249 (2004). https://doi.org/10.1117/1.1790502
  13. G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115-122 (2004). https://doi.org/10.1016/j.optcom.2004.01.002
  14. S. H. Jeon and S. K. Gil, “2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis,” J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354
  15. I.-H. Lee and M. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014). https://doi.org/10.3807/JOSK.2014.18.3.201
  16. I.-H. Lee, “Accumulation encoding technique based on double random phase encryption for transmission of multiple images,” J. Opt. Soc. Korea 18, 401-405 (2014). https://doi.org/10.3807/JOSK.2014.18.4.401

Cited by

  1. Multiple-3D-object decryption based on one interference using two phase-only functions vol.56, pp.22, 2017, https://doi.org/10.1364/AO.56.006214