A holographic optical communication system based on RSA algorithm and quaternion function

Peng YANG , Jianning HAN

Journal of Measurement Science and Instrumentation ›› 2024, Vol. 15 ›› Issue (3) : 338 -343.

PDF (1710KB)
Journal of Measurement Science and Instrumentation ›› 2024, Vol. 15 ›› Issue (3) :338 -343. DOI: 10.62756/jmsi.1674-8042.2024035
Signal and image processing technology
research-article

A holographic optical communication system based on RSA algorithm and quaternion function

Author information +
History +
PDF (1710KB)

Abstract

A facile encryption way was successfully applied to the holographic optical encryption system with high speed, multi-dimensionality, and high capacity, which provided a better security solution for underwater communication. The reconstructed optical security system for information transmission was based on wavelength λ and focal length f that were keys to encryption and decryption. To finish the secure data transmission (λ, f) between sender and receiver, an extended Rivest-Shamir-Adleman(ERSA) algorithm for the encryption was achieved based on three-dimension quaternion function. Therein, the Pollard’s rho method was used for the evaluation and comparison of RSA and ERSA algorithms. The results demonstrate that the message encrypted by the ERSA algorithm has better security than that by RSA algorithm in the face of unpredictability and complexity of information transmission on the unsecure acoustic channel.

Keywords

holography / quaternion / Fourier lens / extended Rivest-Shamir-Adleman(ERSA) / Pollard’s rho method

Cite this article

Download citation ▾
Peng YANG, Jianning HAN. A holographic optical communication system based on RSA algorithm and quaternion function. Journal of Measurement Science and Instrumentation, 2024, 15(3): 338-343 DOI:10.62756/jmsi.1674-8042.2024035

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

GUO J J, ZHANG Y P, HAO Y, et al. Spatially structured-mode multiplexing holography for high-capacity security encryption. ACS Photonics, 2023, 10(3): 757-763.

[2]

WANG X G, WANG W Q, WEI H Y, et al. Holographic and speckle encryption using deep learning. Optics Letters, 2021, 46(23): 5794-5797.

[3]

ZHANG S J, MA H W, YANG Y, et al. End-to-end real-time holographic display based on real-time capture of real scenes. Optics Letters, 2023, 48(7): 1850-1853.

[4]

REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 1995, 20(7): 767-769.

[5]

BARRERA J F, MIRA A, ROBERTO T. Optical encryption and QR codes: secure and noise-free information retrieval. Optics Express, 2013, 21(5): 5373-5378.

[6]

JI Z Y, CHANG J, HUANG Y, et al. Multi-key optical encryption based on two-channel incoherent scattering imaging. Optics Express, 2023, 31(13): 21507-21520.

[7]

TAJAHUERCE E, MATOBA O, VERRALL S C, et al. Optoelectronic information encryption with phase-shifting interferometry. Applied Optics, 2000, 39(14), 2313-2320.

[8]

JAVIDI B, NOMURA T. Securing information by use of digital holography. Optics Letters, 2000, 25(1): 28-30.

[9]

YU L F, CAI L I. Multidimensional data encryption with digital holography. Optics Communications, 2003, 215(4/5/6): 271-284.

[10]

NISHCHAL N K, JOSEPH J, SINGH K. Fully phase encryption using digital holography. Optical Engineering, 2004, 43(12): 2959-2967.

[11]

XIANG P, YU L F, CAI L L. Double-lock for image encryption with virtual optical wavelength. Optics Express, 2002, 10(1): 41-45.

[12]

XIANG P, CUI Z Y, TAN T. Information encryption with virtual-optics imaging system. Optics communications 2002, 212(4/5/6): 235-245.

[13]

MENG X F, CAI L Z, XU X F, et al. Two-step phase-shifting interferometry and its application in image encryption. Optics Letters 2006, 31(10), 1414-1416.

[14]

MENG X, CAI L, XU X, et al. Full-phase image encryption by two-step phase-shifting interferometry. Optik, 2008, 119(9): 434-440.

[15]

TOWGHI N, JAVIDI B, LUO Z. Fully phase encrypted image processor. Journal of the Optical Society Of America A-Optics Image Science and Vision, 1999, 16(8): 1915-1927.

[16]

WANG X G, ZHAO D M. Fully phase multiple-image encryption based on superposition principle and the digital holographic technique. Optics Communications 2012, 285(21/22): 4280-4284.

[17]

LI J, LI J S, SHEN L, et al. Optical image encryption and hiding based on a modified Mach-Zehnder interferometer. Optics Express, 2014, 22(4): 4849-4860.

[18]

RONALD L R, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, 21(2): 120-126.

[19]

ELKAMCHOUCHI H, ELSHENAWY K, SHABAN H. In extended RSA cryptosystem and digital signature schemes in the domain of Gaussian integers//The 8th International Conference on Communication Systems, November 26-28, 2002, Singapore. New York: IEEE, 2002: 91-95.

[20]

CASTAGNOS G. An efficient probabilistic public-key cryptosystem over quadratic fields quotients. Finite Fields and Their Applications 2007, 13(3): 563-576.

[21]

HIDENORI K, KOYAMA K, TSURUOKA Y. A new RSA-type scheme based on singular cubic curves (y-αx)(yx)=x3(mod n). IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1995, 78(1): 27-33.

[22]

YANG P, NAGASE T, SHAN Y, et al. A VOHE system for underwater communications. Electronics, 2020, 9(10): 1557.

[23]

NAGASE T, KOIDE R, ARAKI T, et al. A new quadripartite public-key cryptosystem//IEEE International Symposium on Communications and Information Technology, October 26-29, 2004, Sapporo, Japan. New York: IEEE, 2004: 74-79.

[24]

YANG P, NAGASE T, KANAMOTO T, et al. A virtual optical holographic encryption system using expanded Diffie-Hellman algorithm. IEEE Access, 2021, 9: 22071-22077.

[25]

YANG P, XUE W S, FAN C Q, et al. In promoting a hybrid cryptosystem system’s security based on fresnel lens and RSA algorithm//2022 8th International Conference on Systems and Informatics, December 10-12, 2022, Kunming, China. New York: IEEE, 2022: 1-6.

[26]

DENIZ M, ZHAO Y F, TABASSUM A, et al. Diffractive interconnects: all-optical permutation operation using diffractive networks. Nanophotonics, 2023, 12(5): 905-923.

[27]

YANG P, NAGASE T. In analysis of a virtual optical encryption holographic system: decrypted code using the multiple-bit virtual optical encryption holographic system based on the comsol multiphysics//2019 6th International Conference on Systems and Informatics, November 2-4, 2019, ShangHai, China. New York: IEEE, 2019, 799-803.

[28]

JOHN M P. Monte Carlo methods for index computation. Mathematics of Computation, 1978, 32(143): 918-924.

PDF (1710KB)

59

Accesses

0

Citation

Detail

Sections
Recommended

/