DOI QR코드

DOI QR Code

Three-key Triple Data Encryption Algorithm of a Cryptosystem Based on Phase-shifting Interferometry

  • Seok Hee Jeon (Department of Electronic Engineering, Incheon National University) ;
  • Sang Keun Gil (Department of Electronic Engineering, The University of Suwon)
  • Received : 2023.07.21
  • Accepted : 2023.10.22
  • Published : 2023.12.25

Abstract

In this paper, a three-key triple data encryption algorithm (TDEA) of a digital cryptosystem based on phase-shifting interferometry is proposed. The encryption for plaintext and the decryption for the ciphertext of a complex digital hologram are performed by three independent keys called a wavelength key k1(λ), a reference distance key k2(dr) and a holographic encryption key k3(x, y), which are represented in the reference beam path of phase-shifting interferometry. The results of numerical simulations show that the minimum wavelength spacing between the neighboring independent wavelength keys is about δλ = 0.007 nm, and the minimum distance between the neighboring reference distance keys is about δdr = 50 nm. For the proposed three-key TDEA, choosing the deviation of the key k1(λ) as δλ = 0.4 nm and the deviation of the key k2(dr) as δdr = 500 nm allows the number of independent keys k1(λ) and k2(dr) to be calculated as N(k1) = 80 for a range of 1,530-1,562 nm and N(dr) = 20,000 for a range of 35-45 mm, respectively. The proposed method provides the feasibility of independent keys with many degrees of freedom, and then these flexible independent keys can provide the cryptosystem with very high security.

Keywords

Acknowledgement

This work was supported by Incheon National University (International Cooperative) Research Grant in 2021.

References

  1. M. E. Smid, "Development of the advanced encryption standard," J. Res. Natl. Inst. Stand. Technol. 126, 126024 (2021).
  2. S. Keller, "Modes of operation validation system for the triple data encryption algorithm (TMOVS): Requirements and procedures," American National Standards Institute, ANSI X9.52-1998 (1998).
  3. C.-W. Cheng, M. H. Cantu, and S. Kumar, "Analyzing computational components of standard block encryption schemes," J. Comput. Commun. 10, 81-89 (2022).
  4. W. Chen, B. Javidi, and X. Chen, "Advances in optical security systems," Adv. Opt. Photonics 6, 120-155 (2014). https://doi.org/10.1364/AOP.6.000120
  5. S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). https://doi.org/10.1016/j.optlastec.2013.05.023
  6. B. Javidi, A. Carnicer, M. Yamaguchi, T. Nomura, E. Perez-Cabre, M. S. Millan, N. K. Nishchal, R. Torroba, J. F. Barrera, W. He, X. Peng, A. Stern, Y. Rivenson, A. Alfalou, C. Brosseau, C. Guo, J. T. Sheridan, G. Situ, M. Naruse, T. Matsumoto, I. Juvells, E. Tajahuerce, J. Lancis, W. Chen, X. Chen, P. W. H. Pinkse, A. P. Mosk, and A. Markman, "Roadmap on optical security," J. Opt. 18, 83001 (2016).
  7. B. Javidi and T. Nomura, "Securing information by use of digital holography," Opt. Lett. 25, 28-30 (2000). https://doi.org/10.1364/OL.25.000028
  8. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. 39, 6595-6601 (2000). https://doi.org/10.1364/AO.39.006595
  9. M.-T. Shiu, Y.-K. Chew, H.-T. Chan, X.-Y. Wong, and C.-C. Chang, "Three-dimensional information encryption and anti-counterfeiting using digital holography," Appl. Opt. 54, A84-A88 (2015). https://doi.org/10.1364/AO.54.000A84
  10. E. Tajahuerce, O. Matoba, S. C. Verrall, and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt. 39, 2313-2320 (2000). https://doi.org/10.1364/AO.39.002313
  11. L.-Z. Cai, M.-Z. He, Q. Liu, and X.-L. Yang, "Digital image encryption and watermarking by phase-shifting interferometry," Appl. Opt. 43, 3078-3084 (2004). https://doi.org/10.1364/AO.43.003078
  12. X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
  13. H. Li, "Image encryption based on gyrator transform and twostep phase-shifting interferometry," Opt. Laser Eng. 47, 45-50 (2009). https://doi.org/10.1016/j.optlaseng.2008.08.001
  14. S.-H. Jeon and S.-K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011). https://doi.org/10.3807/JOSK.2011.15.3.244
  15. D. Fan, X. Meng, Y. Wang, X. Yang, X. Peng, W. He, G. Dong, and H. Chen, "Asymmetric cryptosystem and software design based on two-step phase-shifting interferometry and elliptic curve algorithm," Opt. Commun. 309, 50-56 (2013). https://doi.org/10.1016/j.optcom.2013.06.044
  16. S. H. Jeon and S. K. Gil, "Optical implementation of triple DES algorithm based on dual XOR logic operations," J. Opt. Soc. Korea 17, 362-370 (2013). https://doi.org/10.3807/JOSK.2013.17.5.362
  17. E. Ahouzi, W. Zamrani, N. Azami, A. Lizana, J. Campos, and M. Yzuel, "Optical triple random-phase encryption," Opt. Eng. 56, 113114 (2017).
  18. E. Kumari, P. Singh, S. Mukherjee, and G. N. Purohit, "Analysis of triple random phase encoding cryptosystem in Fresnel domain," Result Opt. 1, 100009 (2020).
  19. Y. Zhang and B. Wang, "Optical image encryption based on interference," Opt. Lett. 33, 2443-2445 (2008). https://doi.org/10.1364/OL.33.002443
  20. S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012). https://doi.org/10.3807/JOSK.2012.16.4.354