Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2016, Vol. 33 ›› Issue (5): 604-611.DOI: 10.7523/j.issn.2095-6134.2016.05.005

• Research Articles • Previous Articles     Next Articles

Unconstrained optimization attack on double random phase cryptosystem

WANG Guohua1,2, LI Tuo1,3, ZHANG Sanguo1,2, SHI Yishi1,3   

  1. 1 University of Chinese Academy of Sciences, Beijing 100049, China;
    2 Key Laboratory of Big Data Mining and Knowledge Management, Chinese Academy of Sciences, Beijing 100049, China;
    3 Academy of Opto-electronics, Chinese Academy of Sciences, Beijing 100094, China
  • Received:2016-02-24 Revised:2016-03-31 Online:2016-09-15

Abstract:

An unconstrained optimization method is proposed to attack the double phase encryption system.Under the condition of knowing the plaintext, the new attack method builds an unconstrained optimization model and gets the accurate phase key via this model. Using the acquired phase key, the attacker decrypts the followed cipher. The new attack method transforms the problem of attacking the double phase encryption system into an unconstrained optimization model. The new attack method replaces Hessian matrix by quasi-Newton matrix to avoid computation of the reverse of Hessian matrix. The new attack method has fast convergence speed and strong robustness, and it is not too sensitive to the original values of the variables. This attack method can be applied to other encryption systems.

Key words: optical information security, double random phase cryptosystem, optical attack, unconstrained optimization

CLC Number: