4.5 Article

A special attack on the asymmetric cryptosystem based on phase-truncated Fourier transforms

期刊

OPTICS COMMUNICATIONS
卷 285, 期 6, 页码 1078-1081

出版社

ELSEVIER SCIENCE BV
DOI: 10.1016/j.optcom.2011.12.017

关键词

Asymmetric cryptosystem; Attack; Amplitude retrieval

类别

资金

  1. Zhejiang Provincial Natural Science Foundation of China [R1090168]
  2. National Natural Science Foundation of China (NSFC) [11074219, 10874150]
  3. Zhejiang Education Department [175]
  4. Zhejiang A F University [2009RC01]

向作者/读者索取更多资源

We analyze the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs), and describe a specific attack method to break the cryptosystem. This specific attack, which is based on a two-step iterative amplitude retrieval approach and works by using the public keys and ciphertexts, would allow an attacker to reveal the encrypted information and the decryption keys that generated in the encryption procedure. The numerical simulation results, which are given to show the effectiveness of the proposed specific attack, imply that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptosystem against the specific attack when it is used as a public-key cryptosystem. (C) 2011 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据