Yuan Ke, Jia Chun-Fu, Lv Shu-Wang , Huang Yi-Wang, Gao She-Cheng. A Security Enhanced Mode of Operation Can Be Used in Optical Cryptography[J]. Journal of Electronics & Information Technology, 2013, 35(3): 735-741. doi: 10.3724/SP.J.1146.2012.00930
Citation:
Yuan Ke, Jia Chun-Fu, Lv Shu-Wang , Huang Yi-Wang, Gao She-Cheng. A Security Enhanced Mode of Operation Can Be Used in Optical Cryptography[J]. Journal of Electronics & Information Technology, 2013, 35(3): 735-741. doi: 10.3724/SP.J.1146.2012.00930
Yuan Ke, Jia Chun-Fu, Lv Shu-Wang , Huang Yi-Wang, Gao She-Cheng. A Security Enhanced Mode of Operation Can Be Used in Optical Cryptography[J]. Journal of Electronics & Information Technology, 2013, 35(3): 735-741. doi: 10.3724/SP.J.1146.2012.00930
Citation:
Yuan Ke, Jia Chun-Fu, Lv Shu-Wang , Huang Yi-Wang, Gao She-Cheng. A Security Enhanced Mode of Operation Can Be Used in Optical Cryptography[J]. Journal of Electronics & Information Technology, 2013, 35(3): 735-741. doi: 10.3724/SP.J.1146.2012.00930
①College of Information Technical Science, Nankai University, Tianjin 300071, China②State Key Laboratory of Information Security, Chinese Academy of Sciences, Beijing 100083, China③State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China④Key Laboratory of Optical Information Science and Technology, Ministry of Education, Nankai University, Tianjin 300071, China>
For meeting the high security and high efficiency of cryptography schemes in Cloud Computing, a security enhanced cryptographic mode of operation named Cipher FeedBack one Block one Key (CFB-BK) is proposed, and this mode is implemented based on the combination of mathematical cryptography and optical cryptography. Optical cryptography module encrypts (or decrypts) data blocks in a one block one key way. Moreover, it provides its ciphertext as a feedback to the mathematical cryptography module, which uses it to generate keys for the next block encryption (or decryption) of the optical cryptography module. Security analysis shows that the only possible attack in the area of cryptography for the proposed scheme is exhaustive attack, indicating that no adversary could get a significant advantage against the scheme without spending a huge amount of recourses and time. Efficiency analysis shows that the scheme implementing CFB-BK mode works much faster than the existing modes implemented based on mathematical cryptography.