Open Access
1 August 2011 Universal and special keys based on phase-truncated Fourier transform
Author Affiliations +
Abstract
We propose a novel optical asymmetric cryptosystem based on a phase-truncated Fourier transform. Two decryption keys independent of each other are generated. They are referred to as universal key and special key, respectively. Each of them can be used for decryption independently in absence of the other. The universal key is applicable to decrypt any ciphertext encoded by the same encryption key, but with poor legibility. On the contrary, the special key is adequate for legible decryption, but only valid for one ciphertext corresponding to the specified plaintext. A set of simulation results show the interesting performance of two types of decryption keys.

During the past decade, a lot of effort has been made to develop the techniques of optical cryptography owing to the inherent nature of parallel and multidimensional capability of optical signal processing.1, 2, 3 Most of those optical cryptosystems employ random phase masks (RPMs) as secret keys due to the advantage of huge key space. They always contribute to resistance of an encryption scheme against brute force attacks. However, RPMs are not sufficiently sensitive as expected. This may result in another security worry. It has been recently demonstrated that the double random phase encoding scheme is vulnerable to known-plaintext attacks.4, 5, 6 With phase retrieval techniques, an attacker can easily find the estimates of RPM keys, with which the attacker can recover the plaintext from the corresponding ciphertext. Nevertheless, using phase retrieval strategy to access estimates of RPM keys is only available for linear systems. From another perspective, if employing an appropriate nonlinear transform for encryption, we find out that the insensitivity of RPM will not only avoid suffering a potential crack, but also may allow a cryptosystem possessing other unique features, as introduced later.

From the cryptography point of view, a symmetric cryptosystem would suffer from several problems in practical use, in particular, under the network environment such as key distribution and management.7, 8 Asymmetric scheme is the solution. In this paper, we design a novel asymmetric optical encryption system, in which two different types of decryption keys are particularly involved, named universal key Ku, and special key Ks respectively. The decryption keys differ from the encryption key. Each decryption key has its own function and applicable region in the process of decryption. One universal key corresponds to one encryption key (Ke). Ku can be used to decrypt any ciphertext encoded by Ke, but with poor legibility. On the contrary, Ks is adequate for legible decryption but only valid for one ciphertext corresponding to the specified plaintext.

Now let us discuss the detail about this asymmetric cryptosystem. Phase-truncated Fourier transform (PTFT), which is proposed in our earlier work for the construction of optical asymmetric cryptosystem,9 is used again here to build a multifunctional scheme. PTFT is a process of Fourier transform with an operation of phase truncation, which means only the amplitude (modular part) of Fourier spectrum is retained, while the phase part of the spectrum is truncated. For the sake of simplicity, one-dimensional notation is used to illustrate this concept. Let f(x) denote the image to be encoded, FT( · ) the operator of Fourier transform, PT( · ) the operator of phase truncation, and PR( · ) the operator of phase reservation. Given a Fourier transformation F(u) = FT[f(x)] = |F(u)|exp [i2πφ(u)], the phase truncation and the phase reservation can be respectively expressed as follows:

Eq. 1

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} {\rm PT}\left[ {F\left( u \right)} \right] = \left| {F\left( u \right)} \right|, \end{equation}\end{document} PT Fu=Fu,

Eq. 2

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} {\rm PR}\left[ {F\left( u \right)} \right] = \exp \left[ {i2\pi \varphi \left( u \right)} \right]. \end{equation}\end{document} PR Fu=expi2πϕu.

By implementing the phase-truncated Fourier transform, one can encrypt a plaintext into a noise-like cipher. The encryption process is illustrated in Fig. 1. Let P1 denote an image plaintext and C1 the corresponding ciphertext. The encoded image C1 can be obtained by the following equation:

Eq. 3

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{eqnarray} C_1 \left( u \right) = {\rm PT}\left\{ {{\rm FT}\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right]} \right\}. \end{eqnarray}\end{document} C1u= PT FT P1x·Kex.
Although simple, the encryption should hold a higher security level than the classic double random phase encoding scheme, because the operation of phase truncation is nonlinear. From this point of view, the technique of phase retrieval will be invalid for estimating the phase key. Moreover, the most noticeable point of this optical cryptosystem does not lay in the improvement of security strength but in the existence of a universal key and special key. Figure 1 depicts how to generate a universal key. Performing a Fourier transformation on the encryption key and retaining the phase part, we obtain the universal key as follows:

Eq. 4

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} K_u \left( u \right) = {\rm PR}\left\{ {{\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}. \end{equation}\end{document} Kuu= PR FT Kex.
The special key is recorded in the process of encryption [as shown in Fig. 1] by the following equation:

Eq. 5

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} K_s \left( u \right) = {\rm PR}\left\{ {{\rm FT}\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right]} \right\}. \end{equation}\end{document} Ksu= PR FT P1x·Kex.
It is interesting to note that both Ks and Ku can be used for the purpose of decryption, as shown in Fig. 1. When employing Ks, the decryption is just a reverse operation of the encryption. Under an ideal circumstance, the decryption is lossless because the truncated information is compensated completely. Mathematically it can be written as

Eq. 6

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{equation} P_1 \left( x \right) = {\rm PT}\left\{ {{\rm IFT}\left[ {C_1 \left( u \right) \cdot K_s \left( u \right)} \right]} \right\}, \end{equation}\end{document} P1x= PT IFT C1u·Ksu,
where IFT(·) denotes the inverse Fourier transform. However, Ks is only applicable to decode C1 because Ks is generated from P1, whereas Ku is applicable to decrypt any ciphertext encoded by Ke. If substituting Ku for Ks in Eq. 6, one can still retrieve P1 except for being blurred as

Eq. 7

[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{eqnarray} P_1 ^\prime \left( x \right) &=& {\rm PT}\left\{ {{\rm IFT}\left[ {C_1 \left( u \right) \cdot K_u \left( u \right)} \right]} \right\}\nonumber \\ &=& {\rm PT}\left( {{\rm IFT}\left\{ {FT\left[ {P_1 \left( x \right) \cdot K_e \left( x \right)} \right] \cdot B\left( u \right)} \right\}} \right), \end{eqnarray}\end{document} P1x= PT IFT C1u·Kuu= PT IFT FTP1x·Kex·Bu,
where B(u) is a blurring function given by
[TeX:] \documentclass[12pt]{minimal}\begin{document}\begin{eqnarray*} B\left( u \right) = \frac{{K_s \left( u \right)}}{{K_u \left( u \right)}} = \frac{{{\rm PR}\left\{ {{\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}}}{{{\rm PR}\left\{ {{\rm FT}\left[ {P_1 \left( x \right)} \right] \otimes {\rm FT}\left[ {K_e \left( x \right)} \right]} \right\}}} \end{eqnarray*}\end{document} Bu=KsuKuu= PR FT Kex PR FT P1x FT Kex
where ⊗ means convolution. If the plain image has only low frequency content, FT(P1(x)) will be narrow and B(u) will be close to 1, leading to a good decryption. Therefore, the blurring degree of the decryption result depends on the frequency content of the plaintext. It should be noted that the proposed encryption strategy is only suitable for phase-only keys and real-value plaintexts. If either of them is complex-valued, the decryption function [Eq. 6] will be invalid.

Fig. 1

Flowchart of (a) encryption process with PTFT, (b) generation of universal key, and (c) decryption process.

080501_1_1.jpg

Now we perform a proof-of-concept study with the aid of computer simulation in the environment of MATLAB. Consider images P1 (Lena, 256×256 pixels) and P2 (Baboon, 256×256 pixels) as two plaintexts. The ciphertexts, obtained with PTFT strategy, are two noise-like images, C1 and C2 (they are not shown here for saving space). The encryption key Ke is a random phase mask with the same size as the plaintexts. By using Eq. 4, we can obtain the universal decryption key Ku. Two special decryption keys, Ks1 and Ks2, corresponding to plaintexts, P1 and P2, respectively, are generated in each encryption process, according to Eq. 5. Now let us verify the effectiveness of decryption using the universal key and the special keys, respectively. When the special key Ks1 corresponding to the first plaintext P1 was used to decrypt C1, the Lena image can be clearly recovered, as shown in Fig. 2, whereas when Ks1 was used to decrypt C2, Baboon cannot be retrieved, as shown in Fig. 2. Similarly, the special key Ks2 corresponding to plaintexts P2 also can only be used to effectively decode C2 [see Fig. 2], and cannot be used to recover Lena [see Fig. 2]. These results proved that special keys are only legal for decryptions of the specified ciphertexts. With the right special key, it is lossless to decode the specified cipher but incapable of decoding others. In another case, when the universal key is used in the process of decryptions, both P1 and P2 can be approximately retrieved although being corrupted by noise, as shown in Figs. 2, 2.

Fig. 2

Decryption results of C1 (a) by using special key Ks1, (b) by using unified universal key Ku, and (c) by using a wrong special key Ks2, which is corresponding to C2. (d) Decryption results of C2 by using special keys Ks2, (e) by using unified universal key Ku, and (f) by using a wrong special key Ks1, which is corresponding to C1.

080501_1_2.jpg

The computer simulation results demonstrate that the proposed optical cryptosystem can possess two independent decryption keys. This is quite a different case from that in traditional cryptology. This unique property of the proposed approach may allow the PTFT-based scheme to be used for envisaged application cases. As an example, case 1 would be to secure communications of simple messages (such as binary letters) between the members of a large group. In this case, the decryption effect of a universal key is adequate for the identification of plain messages. Thus, the PTFT scheme could serve as an ordinary asymmetric cryptosystem, regardless of the existence of special keys. As another example, case 2 would be high-security-level communication of delicate messages between two nodes in a network. In this case, the universal key would be irrelevant for the process of decryption, whereas the special key could be used to retrieve the messages precisely. Meanwhile, the security level could be guaranteed in virtue of the one-time pad manner. Some other possible cases may include setting up the security levels for different users, identification and authentication with different security levels, etc.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 60775021 and 60777008), IIFSDU (Grant No. 2010TB019), NIH ( SC COBRE P20RR021949 and Career Award 1k25hl088262-01), and NSF ( MRI CBET-0923311 and SC EPSCoR RII EPS-0903795).

References

1. 

B. Javidi, “Securing information with optical technologies,” Physics Today, 50 27 –32 (1997). https://doi.org/10.1063/1.881691 Google Scholar

2. 

P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., 20 767 –769 (1995). https://doi.org/10.1364/OL.20.000767 Google Scholar

3. 

T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Opt. Eng., 39 2031 –2035 (2000). https://doi.org/10.1117/1.1304844 Google Scholar

4. 

A. Carnicer, M. Montes–Usategui, S. Arcos, and I. Juvells, “Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys,” Opt. Lett., 30 1644 –1646 (2005). https://doi.org/10.1364/OL.30.001644 Google Scholar

5. 

X. Peng, H. Wei, and P. Zhang, “Known-plaintext attack on optical encryption based on double random phase keys,” Opt. Lett., 31 1044 –1046 (2006). https://doi.org/10.1364/OL.31.001044 Google Scholar

6. 

W. Qin and X. Peng, “Vulnerability to known-plaintext attack of optical encryption schemes based on two fractional Fourier transform order keys and double random phase keys,” J. Opt. A: Pure Appl. Opt., 11 075402 (2009). https://doi.org/10.1088/1464-4258/11/7/075402 Google Scholar

7. 

G. H. Lin, H. T. Chang, W. N. Lai, and C. H. Chuang, “Public-key-based optical image cryptosystem with data embedding techniques,” Opt. Eng., 42 2331 –2339 (2003). https://doi.org/10.1117/1.1588660 Google Scholar

8. 

X. Peng, H. Wei, and P. Zhang, “Asymmetric cryptography based on wavefront sensing,” Opt. Lett., 31 3579 –3581 (2006). https://doi.org/10.1364/OL.31.003579 Google Scholar

9. 

W. Qin and X. Peng, “Asymmetric cryptosystem based on phase-truncated Fourier transforms,” Opt. Lett., 35 118 –120 (2010). https://doi.org/10.1364/OL.35.000118 Google Scholar
©(2011) Society of Photo-Optical Instrumentation Engineers (SPIE)
Wan Qin, Xiang Peng, Bruce Gao, and Xiangfeng Meng "Universal and special keys based on phase-truncated Fourier transform," Optical Engineering 50(8), 080501 (1 August 2011). https://doi.org/10.1117/1.3607421
Published: 1 August 2011
Lens.org Logo
CITATIONS
Cited by 54 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Fourier transforms

Computer programming

Computer security

Phase retrieval

Computer simulations

Cryptography

Network security


CHORUS Article. This article was made freely available starting 31 July 2012

RELATED CONTENT


Back to Top