Browse > Article
http://dx.doi.org/10.3807/COPP.2020.4.2.103

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol  

Jeon, Seok Hee (Department of Electronic Engineering, Incheon National University)
Gil, Sang Keun (Department of Electronic Engineering, The University of Suwon)
Publication Information
Current Optics and Photonics / v.4, no.2, 2020 , pp. 103-114 More about this Journal
Abstract
A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.
Keywords
Optical encryption; Phase-shifting digital holography; Asymmetric cryptography; RSA; Public key;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).   DOI
2 O. Matoba and B. Javidi, "Encrypted optical memory system using three-dimensional keys in the Fresnel domain," Opt. Lett. 24, 762-764 (1999).   DOI
3 G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000).   DOI
4 Z. Liu, L. Xu, C. Lin, and S. Liu, "Image encryption by encoding with a nonuniform optical beam in gyrator transform domains," Appl. Opt. 49, 5632-5637 (2010).   DOI
5 W. Chen, X. Chen, and C. J. R. Sheppard, "Optical image encryption based on diffractive imaging," Opt. Lett. 35, 3817-3819 (2010).   DOI
6 X. F. Meng, L. Z. Cai, Y. R. Wang, X. L. Yang, X. F. Xu, G. Y. Dong, X. X. Shen, H. Zhang, and X. C. Cheng, "Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain," J. Opt. A: Pure Appl. Opt. 9, 1070-1075 (2007).   DOI
7 W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Lett. 35, 118-120 (2010).   DOI
8 B. Javidi and T. Nomura, "Polarization encoding for optical security systems," Opt. Eng. 39, 2439-2443 (2000).   DOI
9 P. C. Mogenson and J. Gluckstad, "A phase based optical encryption system with polarization encoding," Opt. Commun. 173, 177-183 (2000).   DOI
10 G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett. 30, 1306-1308 (2005).   DOI
11 D. C. Weber and J. D. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999).   DOI
12 T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng. 39, 2031-2035 (2000).   DOI
13 J.-W. Han, C.-S. Park, D.-H. Ryu, and E.-S. Kim, "Optical image encryption based on XOR operations," Opt. Eng. 38, 47-54 (1999).   DOI
14 S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013).   DOI
15 B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000).   DOI
16 O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett. 27, 321-323 (2002).   DOI
17 E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000).   DOI
18 S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).   DOI
19 L.-Z. Cai, M.-Z. He, Q. Liu, and X.-L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004).   DOI
20 X. F. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006).   DOI
21 S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012).   DOI
22 S. H. Jeon and S. K. Gil, "Optical implementation of cipher block chaining mode algorithm by using phase-shifting digital holography," Opt. Eng. 55, 123112 (2016).   DOI
23 X. Peng, H. Wei, and P. Zhang, "Asymmetric cryptography based on wavefront sensing," Opt. Lett. 31, 3579-3581 (2006).   DOI
24 W. Liu, Z. Liu, and S. Liu, "Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm," Opt. Lett. 38, 1651-1653 (2013).   DOI
25 Y. Xiong, A. He, and C. Quan, "Security analysis of a double-image encryption technique based on an asymmetric algorithm," J. Opt. Soc. Am. A 35, 320-326 (2018).   DOI
26 G. Luan, A. Li, D. Zhang, and D. Wang, "Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain," IEEE Photon. J. 11, 6900207 (2019).
27 G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).   DOI
28 Y. Sheng, Z. Xin, M. S. Alam, L. Xi, and L. Xiao-feng, "Information hiding based on double random-phase encoding and public-key cryptography," Opt. Express 17, 3270-3284 (2009).   DOI
29 S. Yuan, X. Zhou, D. H. Li, and D. F. Zhou, "Simultaneous transmission for an encrypted image and a double randomphase encryption key," Appl. Opt. 46, 3747-3753 (2007).   DOI
30 X. F. Meng, X. Peng, L. Z. Cai, A. M. Li, Z. Gao, and Y. R. Wang, "Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm," J. Opt. A: Pure Appl. Opt. 11, 085402 (2009).   DOI
31 W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory 22, 644-654 (1976).   DOI
32 R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM 21, 120-126 (1978).   DOI
33 S. K. Rajput and N. K. Nishchal, "An optical encryption and authentication scheme using asymmetric keys," J. Opt. Soc. Am. A 31, 1233-1238 (2014).   DOI