Abstract
A smart brute-force double random-phase encoding attack is presented that takes advantage of an unreported vulnerability: the smoothness of mean squared error (MSE) and correlation coefficient (CC) curves in a key-sensitivity analysis. The vulnerability reported here is made visible in a key-sensitivity analysis. It is shown that a modular arithmetic pre-coding provides significant robustness against this form of attack because the pre-coding creates a highly nonlinear, highly oscillatory MSE and CC curve in the key space. Knowledge of this new vulnerability and how to prevent this in the first place provides a better understanding of the robustness of various double random-phase encoding designs.
© 2020 Optical Society of America
Full Article | PDF ArticleMore Like This
Zhihan Wang, Yanfeng Su, Xunyuan Wang, Boyu Wang, Shun Li, Chen Liu, Jinsong Li, Zhijian Cai, and Wenqiang Wan
Appl. Opt. 61(24) 7255-7264 (2022)
Kazuya Nakano, Masafumi Takeda, and Hiroyuki Suzuki
Appl. Opt. 56(15) 4474-4479 (2017)
Yonggang Su, Xinyu Xue, Runzi Deng, Yonghui Wang, Qinyu Zhao, Tianlun Li, Yan Li, Shuaiqi Liu, and Jie Zhao
Appl. Opt. 61(26) 7608-7617 (2022)