{"title":"基于深度学习的相位截断光学编码攻击","authors":"Lina Zhou, Xudong Chen, Wen Chen","doi":"10.1109/NEMO49486.2020.9343452","DOIUrl":null,"url":null,"abstract":"We apply the learning based attack to study the vulnerability of phase-truncated optical encoding scheme. By using a number of ciphertext-plaintext pairs to train a designed learning model, an attacker can effectively analyze the vulnerability of optical encryption scheme based on phase truncation. The learning based attacks for phase-truncated optical encoding can retrieve unknown plaintexts from the given ciphertexts, which can avoid the retrieval of security keys and the design of complex phase retrieval algorithms. It is demonstrated that the learning based attack can provide a promising approach for vulnerability analysis of phase-truncated optical cryptosystems.","PeriodicalId":305562,"journal":{"name":"2020 IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization (NEMO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Deep Learning Based Attack on Phase-Truncated Optical Encoding\",\"authors\":\"Lina Zhou, Xudong Chen, Wen Chen\",\"doi\":\"10.1109/NEMO49486.2020.9343452\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We apply the learning based attack to study the vulnerability of phase-truncated optical encoding scheme. By using a number of ciphertext-plaintext pairs to train a designed learning model, an attacker can effectively analyze the vulnerability of optical encryption scheme based on phase truncation. The learning based attacks for phase-truncated optical encoding can retrieve unknown plaintexts from the given ciphertexts, which can avoid the retrieval of security keys and the design of complex phase retrieval algorithms. It is demonstrated that the learning based attack can provide a promising approach for vulnerability analysis of phase-truncated optical cryptosystems.\",\"PeriodicalId\":305562,\"journal\":{\"name\":\"2020 IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization (NEMO)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization (NEMO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NEMO49486.2020.9343452\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE MTT-S International Conference on Numerical Electromagnetic and Multiphysics Modeling and Optimization (NEMO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NEMO49486.2020.9343452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Deep Learning Based Attack on Phase-Truncated Optical Encoding
We apply the learning based attack to study the vulnerability of phase-truncated optical encoding scheme. By using a number of ciphertext-plaintext pairs to train a designed learning model, an attacker can effectively analyze the vulnerability of optical encryption scheme based on phase truncation. The learning based attacks for phase-truncated optical encoding can retrieve unknown plaintexts from the given ciphertexts, which can avoid the retrieval of security keys and the design of complex phase retrieval algorithms. It is demonstrated that the learning based attack can provide a promising approach for vulnerability analysis of phase-truncated optical cryptosystems.