Search results for "Hybrid cryptosystem"

showing 2 items of 2 documents

New key based on tilted lenses for optical encryption

2016

A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…

Computer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEncryption01 natural sciencesGeneralLiterature_MISCELLANEOUSIndustrial and Manufacturing EngineeringOptical encryption010309 optics03 medical and health sciences0302 clinical medicineOpticsComputer Science::Multimedia0103 physical sciences030221 ophthalmology & optometryHybrid cryptosystemBusiness and International ManagementbusinessComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and SecurityApplied Optics
researchProduct

Security of public key cryptosystems based on Chebyshev Polynomials

2004

Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …

FOS: Computer and information sciencesPlaintext-aware encryptionTheoretical computer scienceComputer Science - Cryptography and SecurityCramer–Shoup cryptosystemData_CODINGANDINFORMATIONTHEORYDeterministic encryptionHybrid cryptosystemCryptosystemElectrical and Electronic EngineeringSemantic securityThreshold cryptosystemCryptography and Security (cs.CR)Goldwasser–Micali cryptosystemMathematics
researchProduct