{"title":"基于相位截断傅立叶变换的非对称密码系统随机攻击","authors":"Abdelaaziz El Ansari, Lahcen Kabouri, E. Ahouzi","doi":"10.1109/NGNS.2014.6990229","DOIUrl":null,"url":null,"abstract":"In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.","PeriodicalId":138330,"journal":{"name":"2014 International Conference on Next Generation Networks and Services (NGNS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Random attack on Asymmetric Cryptosystem based on phase-truncated fourier transforms\",\"authors\":\"Abdelaaziz El Ansari, Lahcen Kabouri, E. Ahouzi\",\"doi\":\"10.1109/NGNS.2014.6990229\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.\",\"PeriodicalId\":138330,\"journal\":{\"name\":\"2014 International Conference on Next Generation Networks and Services (NGNS)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Conference on Next Generation Networks and Services (NGNS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGNS.2014.6990229\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Next Generation Networks and Services (NGNS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGNS.2014.6990229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Random attack on Asymmetric Cryptosystem based on phase-truncated fourier transforms
In this work we show the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms (PTFTs). The weakness that we are trying to show is the possibility of retrieving the “plaintext” image without using its corresponding “ciphertext”, the proposed procedure is based on the use of any image (binary image, random image ...) to recover the primary image after decryption. A series of computer simulations have shown the weakness of Asymmetric Cryptosystem based on Phase-Truncated Fourier Transforms.