{"title":"Random attack on Asymmetric Cryptosystem based on phase-truncated fourier transforms","authors":"Abdelaaziz El Ansari, Lahcen Kabouri, E. Ahouzi","doi":"10.1109/NGNS.2014.6990229","DOIUrl":null,"url":null,"abstract":"In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Next Generation Networks and Services (NGNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGNS.2014.6990229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.