Flexible optical encryption with multiple users and multiple security levels
نویسندگان
چکیده
منابع مشابه
Flexible optical encryption with multiple users and multiple security levels
a r t i c l e i n f o Keywords: Optical image encryption Information security Fractional Fourier transform Three-dimensional image processing Digital holography We present a basic optical encryption architecture that admits several cryptography applications based on multiplexing. Users can decrypt different private images from the same encrypted image, a superuser can have a key that decrypts a...
متن کاملChosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect against partial key exposure or cryptanalysis, or to enforce threshold access to data. Most prior work on this subject has focused on the security of multiple encryption against chosen-plaintext attacks, and has shown con...
متن کاملTight security bounds for multiple encryption
Multiple encryption—the practice of composing a blockcipher several times with itself under independent keys—has received considerable attention of late from the standpoint of provable security. Despite these efforts proving definitive security bounds (i.e., with matching attacks) has remained elusive even for the special case of triple encryption. In this paper we close the gap by improving bo...
متن کاملMultiple Encryption with Minimum
In this paper we consider multiple encryption schemes built from conventional cryptosystems such as DES. The existing schemes are either vulnerable to variants of meet in the middle attacks, i.e. they do not provide security of the full key or there is no proof that the schemes are as secure as the underlying cipher. We propose a new variant of two-key triple encryption which is not vulnerable ...
متن کاملSecure and Fast Hashing Algorithm with Multiple Security Levels
We propose a new secure and fast hashing algorithm with multiple security levels (SFHA-MSL). It is based on the generic 3C (3 compressions) construction and the 3C-X (3C XOR) hash function which is the simplest and efficient variant of the generic 3C hash function and it is the simplest modification to the Merkle-Damgard (M-D) iterated construction that one can achieve. The design principle of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Optics Communications
سال: 2011
ISSN: 0030-4018
DOI: 10.1016/j.optcom.2010.09.065