Browse > Article
http://dx.doi.org/10.3807/COPP.2019.3.2.119

Secret-key-sharing Cryptosystem Using Optical Phase-shifting Digital Holography  

Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University)
Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Current Optics and Photonics / v.3, no.2, 2019 , pp. 119-127 More about this Journal
Abstract
A new secret-key-sharing cryptosystem using optical phase-shifting digital holography is proposed. The proposed secret-key-sharing algorithm is based on the Diffie-Hellman key-exchange protocol, which is modified to an optical cipher system implemented by a two-step quadrature phase-shifting digital holographic encryption method using orthogonal polarization. Two unknown users' private keys are encrypted by two-step phase-shifting digital holography and are changed into three digital-hologram ciphers, which are stored by computer and are opened to a public communication network for secret-key-sharing. Two-step phase-shifting digital holograms are acquired by applying a phase step of 0 or ${\pi}/2$ in the reference beam's path. The encrypted digital hologram in the optical setup is a Fourier-transform hologram, and is recorded on CCDs with 256 quantized gray-level intensities. The digital hologram shows an analog-type noise-like randomized cipher with a two-dimensional array, which has a stronger security level than conventional electronic cryptography, due to the complexity of optical encryption, and protects against the possibility of a replay attack. Decryption with three encrypted digital holograms generates the same shared secret key for each user. Schematically, the proposed optical configuration has the advantage of producing a kind of double-key encryption, which can enhance security strength compared to the conventional Diffie-Hellman key-exchange protocol. Another advantage of the proposed secret-key-sharing cryptosystem is that it is free to change each user's private key in generating the public keys at any time. The proposed method is very effective cryptography when applied to a secret-key-exchange cryptosystem with high security strength.
Keywords
Optical encryption; Phase-shifting digital holography; Cryptography; Secret key sharing; Secret key exchange;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999).   DOI
2 B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000).   DOI
3 X. Wang, D. Zhao, F. Jing, and X. Wei, "Information synthesis (complex amplitude addition and subtraction) and encryption with digital holography and virtual optics," Opt. Exp. 14, 1476-1486 (2006).   DOI
4 J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999).   DOI
5 S. H. Jeon and S. K. Gil, "Optical secret key sharing method based on Diffie-Hellman key exchange algorithm," J. Opt. Soc. Korea 18, 477-484 (2014).   DOI
6 S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012).   DOI
7 B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000).   DOI
8 W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory 22, 644-654 (1976).   DOI
9 S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).   DOI
10 S. K. Gil, S. H. Jeon, and J. R. Jung, "Application to optical secret key sharing cryptography using phase-shifting digital holography," Proc. SPIE 10558, 10558W (2018).
11 W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).   DOI
12 G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005).   DOI
13 X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, "Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain," J. Opt. A: Pure Appl. Opt. 9, 1070-1075 (2007).   DOI
14 W. Chen, X. Chen, and C. J. R. Sheppard, "Optical image encryption based on diffractive imaging," Opt. Lett. 35, 3817-3819 (2010).   DOI
15 Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin, and S. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains," Opt. Commun. 284, 123-128 (2011).   DOI
16 S. H. Jeon and S. K. Gil, "Optical implementation of asymmetric cryptosystem combined with D-H secret key sharing and triple DES," J. Opt. Soc. Korea 19, 592-603 (2015).   DOI
17 O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999).   DOI
18 Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010).   DOI
19 M. Cho and B. Javidi, "Three-dimensional photon counting double-random phase encryption," Opt. Lett. 38, 3198-3201 (2013).   DOI
20 P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).   DOI
21 G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000).   DOI