Grupo de Óptica y Fotónica, Instituto de Física, Universidad de Antioquia, A.A 1226 Medellín, Colombia.
Opt Lett. 2010 Nov 1;35(21):3553-5. doi: 10.1364/OL.35.003553.
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.
我们在这封信件中证明,联合变换相关器容易受到已知明文攻击。未经授权的用户,他拦截了物体及其加密版本,可以获得安全密钥代码掩模。在本贡献中,我们进行了混合启发式攻击方案与格奇伯格-绍克斯顿(Gerchberg-Saxton)例程的合并,以估计加密密钥,从而解码使用同一密钥加密的不同密文。我们还分析了使用不同的明文-密文对来获取加密代码的攻击的成功率。我们提出了解密过程的模拟结果,以证明我们的分析的有效性。