首页 | 本学科首页   官方微博 | 高级检索  
     检索      

双随机相位加密系统的无约束最优化攻击
作者姓名:王国华  李拓  张三国  史祎诗
作者单位:1.中国科学院大学, 北京 100049;2.中国科学院大数据挖掘与知识管理重点实验室, 北京 100049;3.中国科学院光电研究院, 北京 100094
基金项目:国家自然科学基金(61575197)和中国科学院科学融合教育创新项目资助
摘    要:提出一种针对双随机光学相位加密系统的无约束最优化攻击算法.在已知明文条件下,首次将双随机相位加密系统的攻击问题转化为一个单目标无约束最优化模型.基于该模型,在相应的攻击算法设计中,采用拟牛顿矩阵代替Hessian矩阵以准确获取系统的密钥,避免传统牛顿法需要计算Hessian矩阵的逆等严重缺陷.同时,因有效利用拟牛顿矩阵的正定、对称、可迭代求逆的特点,新的攻击算法具有恢复效果好、收敛速度快、初值依赖弱、鲁棒性较强等优势.此外,本算法所需约束条件较少,可方便地移植到其他光学加密系统的攻击中.

关 键 词:光学信息安全  双随机相位加密系统  光学攻击  非约束最优化  
收稿时间:2016-02-24
修稿时间:2016-03-31

Unconstrained optimization attack on double random phase cryptosystem
Authors:WANG Guohua  LI Tuo  ZHANG Sanguo  SHI Yishi
Institution:1.University of Chinese Academy of Sciences, Beijing 100049, China;2.Key Laboratory of Big Data Mining and Knowledge Management, Chinese Academy of Sciences, Beijing 100049, China;3.Academy of Opto-electronics, Chinese Academy of Sciences, Beijing 100094, China
Abstract:An unconstrained optimization method is proposed to attack the double phase encryption system.Under the condition of knowing the plaintext, the new attack method builds an unconstrained optimization model and gets the accurate phase key via this model. Using the acquired phase key, the attacker decrypts the followed cipher. The new attack method transforms the problem of attacking the double phase encryption system into an unconstrained optimization model. The new attack method replaces Hessian matrix by quasi-Newton matrix to avoid computation of the reverse of Hessian matrix. The new attack method has fast convergence speed and strong robustness, and it is not too sensitive to the original values of the variables. This attack method can be applied to other encryption systems.
Keywords:optical information security                                                                                                                        double random phase cryptosystem                                                                                                                        optical attack                                                                                                                        unconstrained optimization
本文献已被 CNKI 等数据库收录!
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号