Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations

  • Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University) ;
  • Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
  • Received : 2013.07.15
  • Accepted : 2013.08.20
  • Published : 2013.10.25


In this paper, we propose a novel optical implementation of a 3DES algorithm based on dual XOR logic operations for a cryptographic system. In the schematic architecture, the optical 3DES system consists of dual XOR logic operations, where XOR logic operation is implemented by using a free-space interconnected optical logic gate method. The main point in the proposed 3DES method is to make a higher secure cryptosystem, which is acquired by encrypting an individual private key separately, and this encrypted private key is used to decrypt the plain text from the cipher text. Schematically, the proposed optical configuration of this cryptosystem can be used for the decryption process as well. The major advantage of this optical method is that vast 2-D data can be processed in parallel very quickly regardless of data size. The proposed scheme can be applied to watermark authentication and can also be applied to the OTP encryption if every different private key is created and used for encryption only once. When a security key has data of $512{\times}256$ pixels in size, our proposed method performs 2,048 DES blocks or 1,024 3DES blocks cipher in this paper. Besides, because the key length is equal to $512{\times}256$ bits, $2^{512{\times}256}$ attempts are required to find the correct key. Numerical simulations show the results to be carried out encryption and decryption successfully with the proposed 3DES algorithm.


Supported by : Incheon National University


  1. B. Schneier, Applied Cryptography, 2nd ed. (John Wiley, New York, USA, 1994).
  2. C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, "On the security defects of an image encryption scheme," Image and Vision Computing 27, 1371-1381 (2009).
  3. B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994).
  4. J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).
  5. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
  6. B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998).
  7. D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999).
  8. E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999).
  9. B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000).
  10. G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000).
  11. G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).
  12. T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
  13. P. Hariharan, "Digital phase-shifting interferometry: a simple error compensating phase calculation algorithm," Appl. Opt. 26, 2504-0505 (1987).
  14. I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. 22, 610-612 (1998).
  15. S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
  16. S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008).
  17. S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010).
  18. S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).
  19. S. H. Jeon and S. K. Gil, "Dual optical encryption for binary data and secret key using phase-shifting digital holography," J. Opt. Soc. Korea 16, 263-269 (2012).
  20. J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999).
  21. C.-M. Shin and S.-J. Kim, "Image encryption using modified exclusive-OR rules and phase-wrapping technique," Opt. Commun. 254, 67-75 (2005).

Cited by

  1. XOR and XNOR operations at 125 Gb/s using cascaded carrier-depletion microring resonators vol.22, pp.3, 2014,
  2. Optical Implementation of Asymmetric Cryptosystem Combined with D-H Secret Key Sharing and Triple DES vol.19, pp.6, 2015,
  3. Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm vol.18, pp.5, 2014,
  4. Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography vol.55, pp.12, 2016,