Browse > Article
http://dx.doi.org/10.3807/JOSK.2014.18.5.477

Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm  

Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University)
Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Journal of the Optical Society of Korea / v.18, no.5, 2014 , pp. 477-484 More about this Journal
Abstract
In this paper, we propose a new optical secret key sharing method based on the Diffie-Hellman key exchange protocol required in cipher system. The proposed method is optically implemented by using a free-space interconnected optical logic gate technique in order to process XOR logic operations in parallel. Also, we present a compact type of optical module which can perform the modified Diffie-Hellman key exchange for a cryptographic system. Schematically, the proposed optical configuration has an advantage of producing an open public key and a shared secret key simultaneously. Another advantage is that our proposed key exchange system uses a similarity to double key encryption techniques to enhance security strength. This can provide a higher security cryptosystem than the conventional Diffie-Hellman key exchange protocol due to the complexity of the shared secret key. Results of numerical simulation are presented to verify the proposed method and show the effectiveness in the modified Diffie-Hellman key exchange system.
Keywords
Deffie-Hellman key exchange; Secret key sharing; Optical encryption; Cryptosystem;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 B. Schneier, Applied Cryptography, 2nd ed. (John Wiley, New York, USA, 1994).
2 W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. on Info. Theory 22, 644-654 (1976).   DOI
3 B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994).   DOI   ScienceOn
4 J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).   DOI
5 P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).   DOI   ScienceOn
6 B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998).   DOI   ScienceOn
7 D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999).   DOI   ScienceOn
8 E. Cuche, F. Bevilacqua, and C. Depeursinge, "Digital holography for quantitative phase-contrast imaging," Opt. Lett. 24, 291-293 (1999).   DOI   ScienceOn
9 B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000).   DOI   ScienceOn
10 G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000).   DOI   ScienceOn
11 T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
12 G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).   DOI   ScienceOn
13 S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008).   DOI
14 B. M. Hennelly and J. T. Sheridan, "Random phase and jigsaw encryption in the Fraesnel domain," Opt. Eng. 43, 2239-2249 (2004).   DOI   ScienceOn
15 G. Situ and J. Zhang, "A lensless optical secyrity system based on computer-generated phase only masks," Opt. Commun. 232, 115-122 (2004).   DOI   ScienceOn
16 S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
17 S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010).   과학기술학회마을   DOI   ScienceOn
18 S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).   과학기술학회마을   DOI   ScienceOn
19 S. H. Jeon and S. K. Gil, "Dual optical encryption for binary data and secret key using phase-shifting digital holography," J. Opt. Soc. Korea 16, 263-269 (2012).   과학기술학회마을   DOI   ScienceOn
20 J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999).   DOI   ScienceOn
21 C.-M. Shin and S.-J. Kim, "Image encryption using modified exclusive-OR rules and phase-wrapping technique," Opt. Commun. 254, 67-75 (2005).   DOI   ScienceOn
22 A. Sinha, "Fractional Fourier transform based key exchange for asymmetric key cryptography," in Proc. the 6th WSEAS Int. Conf. on Electronics, Hardware and Optical Communications (Corfu Island, Greece, Feb. 2007), pp. 51-54.
23 S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013).   과학기술학회마을   DOI   ScienceOn