Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.5.073

A Countermeasure against Brute-force Attack using Digital Holography and DES Algorithm  

Noh, Chang-Oh (Dept. of Computer Engineering, Chosun University)
Moon, In-Kyu (School of Computer Engineering, Chosun University)
Cho, Beom-Joon (School of Computer Engineering, Chosun University)
Abstract
The DES encryption algorithm employed in information security has a strong avalanche effect, and the processing speed to encrypt is also fast. However, due to the H/W advances, the secret key length of DES having 56bits is not enough so that it is easily exposed to brute force attack. In this paper, we present a new method to significantly increase the secret key length in the DES by integration of digital holography and DES algorithm. In addition, we evaluate the encryption performance of the proposed method by measuring the avalanche effect and verify the possibility of it.
Keywords
Digital Holography; DES; Avalanche Effect; Brute-force attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical Techniques for Information Security," Proceedings of the IEEE, Vol. 97, pp. 1128-1148 2009.   DOI   ScienceOn
2 Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Optics Exp. Vol. 15, pp. 10253-10265, 2007.   DOI
3 I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. Vol. 22, pp. 1268-1270, 1997.   DOI   ScienceOn
4 B. Javidi and E. Tajahuerce, "Three dimensional object recognition by use of digital holography," Opt. Lett. Vol. 25, pp. 610-612, 2000.   DOI   ScienceOn
5 H. Kim, D. Kim, and Y. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Optics Exp. Vol. 12, pp. 4912-4921, 2004.   DOI
6 J. W. Goodman, "Introduction to Fourier Optics," McGraw-Hill, New York, USA, 1996.
7 T. Shimobaba, Y. Sato, J. Miura, M. Takenouchi, and T. Ito, "Real-time digital holographic microscopy using the graphic processing unit," Optics Exp. Vol. 16, pp. 11776-11781, 2008.   DOI
8 S. Kishk and B. Javidi, "3D object watermarking by a 3D hidden object," Optics Exp. Vol. 11, pp. 874-888, 2003.   DOI
9 E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. Vol. 39, pp. 6595-6601, 2000.   DOI
10 W. Stallings, "Crytography and network security," Pearson, New York, USA, 2011.