版权说明 操作指南
首页 > 成果 > 详情

A hybrid two-step attack on double-images nonlinear cryptosystem using phase truncation operation

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Ding, Xiangling;Chen, Guangyi;Yang, Gaobo*
通讯作者:
Yang, Gaobo
作者机构:
[Yang, Gaobo; Ding, Xiangling] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China.
[Ding, Xiangling] Huaihua Univ, Dept Phys & Informat Engn, Huaihua 418008, Peoples R China.
[Chen, Guangyi] Hunan Agr Univ, Coll Informat Sci & Technol, Changsha 410128, Hunan, Peoples R China.
通讯机构:
[Yang, Gaobo] H
Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China.
语种:
英文
关键词:
Hybrid two-step attack;Iterative algorithm;Nonlinear cryptosystem;Phase truncation operation
期刊:
Optik
ISSN:
0030-4026
年:
2015
卷:
126
期:
21
页码:
2832-2838
基金类别:
Key Laboratory of Intelligent Control Technology for Ecological Agriculture in Wuling Mountain Areas of Hunan Province of China [ZNKZ2014-1]; project of Educational Commission of Hunan Province of China [13C715]; project of Huaihua Innovative Research Team of Huaihua; project of Huaihua Science and Technology of Huaihua [2013-10]
机构署名:
本校为其他机构
院系归属:
信息科学技术学院
摘要:
In this paper, a hybrid two-step attack strategy is proposed to break the double-images nonlinear encryption system using phase truncation operation. The attack process is composed of two steps. First, an iterative algorithm is exploited to obtain an approximate value of the encoded image when the ciphertext and the encryption key are placed on the input plane and the output plane, respectively. Second, two approximate values of the original images are achieved by the use of decryption key, which is generated by another two encryption keys. Simulation results show that the proposed hybrid atta...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com