Key-space analysis of double random phase encryption technique

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Monaghan, David S.
dc.contributor.author Gopinathan, Unnikrishnan
dc.contributor.author Naughton, Thomas J.
dc.contributor.author Sheridan, John T.
dc.date.accessioned 2011-11-28T16:37:52Z
dc.date.available 2011-11-28T16:37:52Z
dc.date.copyright 2007 Optical Society of America en
dc.date.issued 2007-09-10
dc.identifier.citation Applied Optics en
dc.identifier.issn 0003-6935 (print)
dc.identifier.issn 1539-4522 (online)
dc.identifier.uri http://hdl.handle.net/10197/3356
dc.description.abstract We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack. en
dc.description.sponsorship Science Foundation Ireland en
dc.description.sponsorship Irish Research Council for Science, Engineering and Technology en
dc.format.extent 1396137 bytes
dc.format.extent 1072 bytes
dc.format.mimetype application/pdf
dc.format.mimetype text/plain
dc.language.iso en en
dc.publisher Optical Society of America en
dc.rights This paper was published in Applied Optics and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://www.opticsinfobase.org/abstract.cfm?URI=ao-46-26-6641. Systematic or multiple reproduction or distribution to multiple locations via electronic or other means is prohibited and is subject to penalties under law. en
dc.subject.lcsh Data encryption (Computer science) en
dc.subject.lcsh Numerical analysis en
dc.subject.lcsh Image processing--Digital techniques en
dc.title Key-space analysis of double random phase encryption technique en
dc.type Journal Article en
dc.internal.availability Full text available en
dc.internal.webversions Publisher's version en
dc.internal.webversions http://dx.doi.org/10.1364/AO.46.006641 en
dc.status Not peer reviewed en
dc.identifier.volume 46 en
dc.identifier.issue 26 en
dc.identifier.startpage 6641 en
dc.identifier.endpage 6647 en
dc.identifier.doi 10.1364/AO.46.006641
dc.neeo.contributor Monaghan|David S.|aut| en
dc.neeo.contributor Gopinathan|Unnikrishnan|aut| en
dc.neeo.contributor Naughton|Thomas J.|aut| en
dc.neeo.contributor Sheridan|John T.|aut| en
dc.description.othersponsorship Enterprise Ireland en
dc.description.admin pu, pe, la, sp, is, en - TS 17.11.11 en


Files in this item

This item appears in the following Collection(s)

Show simple item record

This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.

If you are a publisher or author and have copyright concerns for any item, please email research.repository@ucd.ie and the item will be withdrawn immediately. The author or person responsible for depositing the article will be contacted within one business day.

Search Research Repository


Advanced Search

Browse