Multi-User Nonlinear Optical Cryptosystem Based on Polar Decomposition and Fractional Vortex Speckle Patterns

نویسندگان

چکیده

In this paper, we propose a new multiuser nonlinear optical cryptosystem using fractional-order vortex speckle (FOVS) patterns as security keys. conventional cryptosystems, mostly random phase masks are used the keys which prone to various attacks such brute force attack. current study, FOVSs generated optically by scattering of beam, known for azimuthal and helical wavefronts, through ground glass diffuser. have remarkable property that makes them almost impossible replicate. input plane, amplitude image is first encoded then modulated with FOVS mask obtain complex image. This further processed encrypted proposed method. Two private obtained polar decomposition enables multi-user capability in cryptosystem. The robustness method tested against existing contamination attack known-plaintext Numerical simulations confirm validity feasibility

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nonlinear beam steering by fractional vortex dipoles

Propagation of optical beams in nonlinear media NLM has been a subject of continuing interest for more than 4 decades due to the possibility for creation of reconfigurable waveguides through the intensity-dependent refractive index change 1,2 . Such optically induced waveguides can guide weak signal beams and pulses 3,4 , which motivates the investigation of novel techniques for manipulation of...

متن کامل

A nonlinear cryptosystem based on elliptic curves *

We propose a new system that is applicable to public key cryptography. The system is a variant of the Discrete Logarithm Problem (DLP) with the elements of a certain group, formed with points of an elliptic curve, and the elements of a certain finite field related to the curve. The nonlinear term refers to the coefficient that we use as the problem to solve because it is obtained with a nonline...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

Secret Key Cryptosystem Based on Non-systematic Polar Codes

˗ Polar codes are provably capacity achieving linear block codes. The generator matrix of these codes is specified by knowing the parameters of transmission channel, length and dimension of the used code. On the other hand, for the cryptosystems based on general decoding problem (i.e. code based cryptosystems), the generator matrix of the applied code should be properly hidden from the attacker...

متن کامل

Optical vortex coronagraphs on ground-based telescopes

The optical vortex coronagraph is potentially a remarkably effective device, at least for an ideal unobstructed telescope. Most groundbased telescopes however suffer from central obscuration and also have to operate through the aberrations of the turbulent atmosphere. This note analyzes the performance of the optical vortex in these circumstances and compares to some other designs, showing that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Photonics

سال: 2023

ISSN: ['2304-6732']

DOI: https://doi.org/10.3390/photonics10050561