Browse > Article
http://dx.doi.org/10.3807/JOSK.2016.20.1.055

Asymmetric Public Key Cryptography by Using Logic-based Optical Processing  

Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Journal of the Optical Society of Korea / v.20, no.1, 2016 , pp. 55-63 More about this Journal
Abstract
In this paper, a new asymmetric public key cryptography based on the modified RSA algorithm is proposed by using logic-based optical processing. The proposed asymmetric public key algorithm is realized into an optical schematic, where AND, OR and XOR logic operations are implemented by using free space digital optics architecture. Schematically, the proposed optical configuration has an advantage of generating the public keys simultaneously. Another advantage is that the suggested optical setup can also be used for message encryption and decryption by simply replacing data inputs of SLMs in the optical configuration. The last merit is that the optical configuration has a 2-D array data format which can increase the key length easily. This can provide longer 2-D key length resulting in a higher security cryptosystem than the conventional 1-D key length cryptosystem. Results of numerical simulation and differential cryptanalysis are presented to verify that the proposed method shows the effectiveness in the optical asymmetric cryptographic system.
Keywords
Optical encryption; Optical logic; RSA cryptosystem; Asymmetrical public key; Cryptography;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. on Inf. Theory 22, 644-654 (1976).   DOI
2 W. C. Barker and E. Barker, “Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher,” NIST Special Publication 800-67, Revision 1 (2012).
3 R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” ACM 21, 120-126 (1978).   DOI
4 B. Javidi and J. L. Horner, “Optical pattern recognition for validation and security verification,” Opt. Eng. 33, 1752-1756 (1994).   DOI
5 J. F. Heanue, M. C. Bashaw, and L. Hesselink, “Encrypted holographic data storage based on orthogonal-phase-code multiplexing,” Appl. Opt. 34, 6012-6015 (1995).   DOI
6 P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett. 20, 767-769 (1995).   DOI
7 G. Unnikrishnan and K. Singh, “Double random fractional Fourier domain encoding for optical security,” Opt. Eng. 39, 2853-2859 (2000).   DOI
8 B. Javidi, A. Sergent, and E. Ahouzi, “Performance of double phase encoding encryption technique using binarized encrypted images,” Opt. Eng. 37, 565-569 (1998).   DOI
9 D. Weber and J. Trolinger, “Novel implementation of nonlinear joint transform correlators in optical security and validation,” Opt. Eng. 38, 62-68 (1999).   DOI
10 E. Cuche, F. Bevilacqua, and C. Depeursinge, “Digital holography for quantitative phase-contrast imaging,” Opt. Lett. 24, 291-293 (1999).   DOI
11 G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “Public-key-based optical image cryptosystem based on data embedding techniques,” Opt. Eng. 42, 2331-2339 (2003).   DOI
12 B. M. Hennelly and J. T. Sheridan, “Random phase and jigsaw encryption in the Fresnel domain,” Opt. Eng. 43, 2239-2249 (2004).   DOI
13 G. Situ and J. Zhang, “A lensless optical security system based on computer-generated phase only masks,” Opt. Commun. 232, 115-122 (2004).   DOI
14 S. H. Jeon and S. K. Gil, “2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis,” J. Opt. Soc. Korea 16, 354-364 (2012).   DOI
15 I.-H. Lee, “Accumulation encoding technique based on double random phase encryption for transmission of multiple images,” J. Opt. Soc. Korea 18, 401-405 (2014).   DOI
16 I.-H. Lee and M. Cho, “Double random phase encryption using orthogonal encoding for multiple-image transmission,” J. Opt. Soc. Korea 18, 201-206 (2014).   DOI